Labour Day - Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dpm65

350-901 Developing Applications using Cisco Core Platforms and APIs (DEVCOR) Questions and Answers

Questions 4

An enterprise refactors its monolithic application into a modem cloud-native application that is based on microservices. A key requirement of the application design is to ensure that the IT team is aware of performance issues or bottlenecks in the new application Which two approaches must be part of the design considerations'' (Choose two.)

Options:

A.

Periodically scale up the resources of the host machines when the application starts to experience high loads

B.

Instrument the application code to gather telemetry data from logs, metrics or tracing

C.

Adopt a service-oriented architecture to handle communication between the services that make up the application

D.

Deploy infrastructure monitoring agents into the operating system of the host machines

E.

Implement infrastructure monitoring to ensure that pipeline components interoperate smoothly and reliably

Buy Now
Questions 5

Drag and drop the code from the bottom onto the box where the code is missing to permit network traffic between 10.0.0.0/8 and all other networks on port 80 for a Cisco Nexus 9000 switch by using the Puppet module. Not all options are used.

350-901 Question 5

Options:

Buy Now
Questions 6

Refer to the exhibit.

350-901 Question 6

Which code snippet is required in the headers to successfully authorize wireless information from Cisco DNA Center?

Options:

A.

headers = {‘X-auth-token’:’fa8426a0-8eaf-4d22-8e13-7c1b16a9370c’}

B.

headers = {‘Authorization’:’Basic YWRtaW46R3JhcGV2aW5IMQ==’}

C.

headers = {‘Authorization’:’Bearer ASDNFALKJER23412RKDALSNKF”}

D.

headers = {‘Content-type’:’application/json}

Buy Now
Questions 7

Refer to the exhibit.

350-901 Question 7

Drag and drop the code from the bottom onto the box where the code is missing to construct a Python script that will retrieve location data Not all options are used.

350-901 Question 7

Options:

Buy Now
Questions 8

A user is receiving a 429 Too Many Requests error. Which scheme is the server employing that causes this error?

Options:

A.

rate limiting

B.

time outs

C.

caching

D.

redirection

Buy Now
Questions 9

A development team is looking for a tool to automate configurations across the infrastructure. The tool must have these characteristics:

•written in Python

•define playbooks (or intent

•stateless

•imperative

Which tool meets these requirements?

Options:

A.

Puppet

B.

Netmiko

C.

Ansible

D.

NCM

Buy Now
Questions 10

Drag and drop the characteristics from the left onto the correct data processing techniques on the right, in the context of GDPR.

350-901 Question 10

Options:

Buy Now
Questions 11

A developer is creating a Python script to use the Webex Teams REST API to list joined spaces, and gracefully handle and print the errors it receives. Drag and drop the code snippets from the left onto the item numbers on the right that match the missing sections in the exhibit to complete the script.

350-901 Question 11

350-901 Question 11

Options:

Buy Now
Questions 12

Where should distributed load balancing occur in a horizontally scalable architecture?

Options:

A.

firewall-side/policy load balancing

B.

network-side/central load balancing

C.

service-side/remote load balancing

D.

client-side/local load balancing

Buy Now
Questions 13

Which HTTP status code indicates that a client application is experiencing intentional rate limiting by the server?

Options:

A.

202

B.

401

C.

429

D.

503

Buy Now
Questions 14

An application has initiated an OAuth authorization code grant flow to get access to an API resource on behalf of an end user.

Which two parameters are specified in the HTTP request coming back to the application as the end user grants access? (Choose two.)

Options:

A.

access token and a refresh token with respective expiration times to access the API resource

B.

access token and expiration time to access the API resource

C.

redirect URI a panel that shows the list of permissions to grant

D.

code that can be exchanged for an access token

E.

state can be used for correlation and security checks

Buy Now
Questions 15

There is a requirement to securely store unique usernames and passwords. Given a valid username, it is also required to validate that the password provided is correct. Which action accomplishes this task?

Options:

A.

Encrypt the username, hash the password, and store these values.

B.

Hash the username, hash the password, and store these values.

C.

Encrypt the username, encrypt the password, and store these values.

D.

Hash the username, encrypt the password, and store these values.

Buy Now
Questions 16

A developer must deploy a containerized application foe network device inventory management. The developer sets up a Kubernetes duster on two separate hypervisors. The SLA is not currently meeting a specified maximum value for network latencyjitter CPU/memory and disk I/O are functioning property. Which two design approaches resolve the issue'' (Choose two.)

Options:

A.

Colocate services in the same pod

B.

Replace the HDD drives with SSD drives

C.

Enable IPv6 within the duster

D.

Deploy the duster to a bare metal server

E.

Upgrade the server NIC card

Buy Now
Questions 17

A developer corrects an application bug with ID buglDa98416945110x and then installs it on a Cisco Catalyst 9300 series switch. Which command will enable the application called myapp?

Options:

A.

app-hosting install appid myapp package usbflash1:myapp.tar

B.

app-hosting run re-start appid my app bugfix

C.

app-hosting activate appid myapp

D.

app-hosting start appid myapp

Buy Now
Questions 18

{'lat': 37.4180951010362, 'lng': -122.098531723022, 'address': '', 'serial': 'Q2HP-F5K5-F98Q',

'mac': '88:15:44:ea:f5:bf', 'lanIp': '10.10.10.15',

'url': 'https://n149.meraki.com/DevNet-Sandbox/n/EFZDavc/manage/nodes/new_list/78214561218351',

'model': 'MS220-8P', 'switchProfileId': None, 'firmware': 'switch-11-31', 'floorPlanId': None}

Refer to the exhibit. A developer needs to find the geographical coordinates of a device on the network L_397561557481105433 using a Python script to query the Meraki API. After running response = requests.get() against the Meraki API, the value of response.text is shown in the exhibit.

What Python code is needed to retrieve the longitude and latitude coordinates of the device?

Options:

A.

latitude = response.text['lat']

longitude = response.text['lng']

B.

latitude = response.json()['lat']

longitude = response.json()['lng']

C.

latitude = response.json()[0]

longitude = response.json()[1]

D.

latitude = response.text[0]

longitude = response.text[1]

Buy Now
Questions 19

Which security approach should be used for developing a REST API?

Options:

A.

Use custom security relevant HTTP response codes

B.

Utilise TLS for end to end encryption

C.

Add an API key to each URL string

D.

Utilize CORS headers

Buy Now
Questions 20

A network engineer needs to retrieve interface data using the Cisco IOS XE YANG Model. Drag and drop the

components from the bottom onto the box where the code is missing to complete the RESTCONF URI. Not all

options are used.

350-901 Question 20

Options:

Buy Now
Questions 21

Refer to the exhibit.

350-901 Question 21

This script uses ciscoyang to configure two VRF instances on a Cisco IOS-XR device using the Yang NETCONF type.

Which two words are required to complete the script? (Choose two.)

Options:

A.

ensure

B.

commit

C.

false

D.

replace

E.

none

Buy Now
Questions 22

Refer to the exhibit.

350-901 Question 22

Drag and drop the code from the bottom onto the box where the code is missing in the script to read from a .csv file and import the host entries. The script uses the Cisco Firepower API to create the appropriate entries. The script will be used as part of the security analysis dashboard application to visualize data about network security and host information. Not all options are used.

350-901 Question 22

Options:

Buy Now
Questions 23

Refer to the exhibit. Which snippet creates a Webex Teams space and adds the users in the variable user list to that space?

A)

350-901 Question 23

B)

350-901 Question 23

C)

350-901 Question 23

D)

350-901 Question 23

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 24

Drag and drop the REST API authentication method from the left to the description on the right

350-901 Question 24

Options:

Buy Now
Questions 25

A Cisco Catalyst 9000 switch has guest shell enabled. Which Linux command installs a third-party application?

Options:

A.

yum Install

B.

apt-get install

C.

zypper install

D.

dnf install

Buy Now
Questions 26

Refer to the exhibit. The code fetches the latest order from the purchases table for a specific user. An engineer needs to pass query parameters to the execute function to prevent an SQL injection attack. Which code snippet must be placed in the blank in the code to meet this requirement?

A)

350-901 Question 26

B)

350-901 Question 26

C)

350-901 Question 26

D)

350-901 Question 26

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 27

Refer to the exhibit.

350-901 Question 27

Cisco IOS XE switches are used across the entire network and the description that is filed for all interfaces must be configured. Which code snippet must be placed in the blank in the script to leverage RESTCONF to query all the devices in the device list for the interfaces that are present?

A)

350-901 Question 27

B)

350-901 Question 27

C)

350-901 Question 27

D)

350-901 Question 27

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 28

A developer plans to create a new bugfix branch to fix a bug that was found on the release branch. Which command completes the task?

Options:

A.

git checkout -b RELEASE BUGFIX

B.

git checkout -t BUGF1X RELEASE

C.

git checkout -b BUG FIX RELEASE

D.

git checkout -t RELEASE BUGFIX

Buy Now
Questions 29

Drag and drop the code from the bottom onto the box where the code is missing to retrieve and display wireless network hearth information. The wireless network devices are being managed by Cisco DNA Center and are compatible with REST API Not all options are used.

350-901 Question 29

Options:

Buy Now
Questions 30

User report that they can no longer process transactions with the online ordering application, and the logging dashboard is displaying these messages.

Fri Jan 10 19:37:31.123 EST 2020 [FRONTEND] INFO: Incoming request to add item to cart from user 45834534858

Fri Jan 10 19:37:31 247 EST 2020 [BACKEND] INFO: Attempting to add item to cart

Fri Jan 10 19:37:31 250 EST 2020 [BACKEND] ERROR: Failed to add item: MYSQLDB ERROR: Connection refused

What is causing the problem seen in these log messages?

Options:

A.

The database server container has crashed.

B.

The backend process is overwhelmed with too many transactions.

C.

The backend is not authorized to commit to the database.

D.

The user is not authorized to add the item to their cart.

Buy Now
Questions 31

A developer is working on a live project and must apply a new feature. After the commit,the manager informs the team that the wrong file was applied. The developer must undo the single commit and apply the file with the name feature-App-UXU1411841916ADD. Which command must the developer use?

Options:

A.

git revert

B.

git checkout

C.

git clean

D.

git reset

Buy Now
Questions 32

Refer to the exhibit.

350-901 Question 32

A kubeconfig file to manage access to clusters is provided. How many clusters are defined and which of them are accessed using username/password authentication versus certificate?

Options:

A.

two clusters; scratch

B.

three clusters; scratch

C.

three clusters; development

D.

two clusters; development

Buy Now
Questions 33

An application is being built to collect and display telemetry streaming data. Drag and drop the elements of this stack from the left onto the correct element functions on the right.

350-901 Question 33

Options:

Buy Now
Questions 34

A developer is creating a Python script to catch errors using REST API calls and to aid in debugging. Drag and drop the code from the bottom onto the box where the code is missing to implement control flow for REST API errors. Not all options are used.

350-901 Question 34

Options:

Buy Now
Questions 35

Which two techniques protect against injection attacks? (Choose two.)

Options:

A.

input validation

B.

trim whitespace

C.

limit text areas to 255 characters

D.

string escaping of user free text and data entry

E.

only use dropdown, checkbox, and radio button fields

Buy Now
Questions 36

A client is written that uses a REST API to interact with a server. Using HTTPS as the transport, an HTTP request is sent and received an HTTP response. The response contains the HTTP response status code: 503 Service Unavailable.

Which action is the appropriate response?

Options:

A.

Add an Authorization header that supplies appropriate credentials and sends the updated request.

B.

Resend the request using HTTP as the transport instead of HTTPS.

C.

Add an Accept header that indicates the content types that the client understands and send the updated request.

D.

Look for a Retry-After header in the response and resend the request after the amount of time indicated.

Buy Now
Questions 37

What is the function of dependency management?

Options:

A.

separating code into modules that execute independently

B.

utilizing a single programming language/framework for each code project

C.

automating the identification and resolution of code dependencies

D.

managing and enforcing unique software version names or numbers

Buy Now
Questions 38

Refer to the exhibit.

350-901 Question 38

An engineer is managing a network that consists of Cisco IOSXE devices. There is a need to retrieve the details of the interface GigabitEthernet2 using RESTCONF. Which URI will accomplish this by providing the same response as shown in the JSON body?

A)

350-901 Question 38

B)

350-901 Question 38

C)

350-901 Question 38

D)

350-901 Question 38

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 39

Which two design considerations should be considered when building a Cisco Meraki dashboard out of available APIs? (Choose two,)

Options:

A.

API call volume is rate-limited to five calls per second per organization.

B.

The API version does not need to be specified in the URL.

C.

Access to the API must first be enabled by using the settings for an organization.

D.

The API requests require the key and the user credentials.

E.

If the API key is shared, it cannot be regenerated

Buy Now
Questions 40

A developer is designing an application that uses confidential information for a company and its clients. The developer must implement different secret storage techniques for each handled secret to enforce security policy compliance within a project. Drag and drop the security policy requirements from the left onto the storage solutions on the right

350-901 Question 40

Options:

Buy Now
Questions 41

350-901 Question 41

350-901 Question 41

Refer to the exhibits. An interface named “GigabitEthernet2” has been configured on a Cisco IOS XE device. Using RESTCONF APIs as defined by the ietf-interfaces@2014-05-08.yang model, which two combinations of “rest_operation” and “payload” must be added to the Python script to set the “description” to “Configured by RESTCONF”? (Choose two.)

350-901 Question 41

350-901 Question 41

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

E.

Option E

Buy Now
Questions 42

The UCS Python SDK includes modules for Service Profile template creation. Which two UCS Service Profile template types are supported? (Choose two.)

Options:

A.

initial-template

B.

updating-template

C.

abstract-template

D.

attached-template

E.

base-template

Buy Now
Questions 43

Refer to the exhibit.

350-901 Question 43

An architect wrote an application to collect device information from the Cisco Meraki Dashboard API. Every time a network change occurs the application collects information and records new endpoint MAC addresses. The application stopped working after the locations and network equipment of a competitor were acquired. Which application approach must be applied to reduce latency and rate limiting?

Options:

A.

MOS scoring system before collecting information

B.

leaky faucet algorithm for fault categorizing

C.

error handling to check for reachability first

D.

webhooks to trigger updates

Buy Now
Questions 44

A timeframe custom dashboard must be developed to present data collected from Cisco Meraki. The dashboard must include a wireless health alert count. What needs to be built as a prerequisite?

Options:

A.

A publicly available HTTP server to receive Meraki Webhooks from the Meraki Dashboard API

B.

A publicly available HTTP server to receive Meraki Webhooks from the Meraki Scanning API

C.

A daemon to consume the Wireless Health endpoint of the Meraki Scanning API

D.

A daemon to consume the Wireless Health endpoint of the Meraki Dashboard API

Buy Now
Questions 45

Which two methods are API security best practices? (Choose two.)

Options:

A.

Use tokens after the identity of a client has been established.

B.

Use the same operating system throughout the infrastructure.

C.

Use encryption and signatures to secure data.

D.

Use basic auth credentials over all internal API interactions.

E.

Use cloud hosting services to manage security configuration.

Buy Now
Questions 46

What is a benefit of running multiple instances of a back-end service and using load balancing to distribute the communication between the front-end and back-end services?

Options:

A.

The consistency of data for stateful services increases.

B.

High availability is provided for the back-end services.

C.

Scaling horizontally is automated out of the box.

D.

The total load on the database servers decreases.

Buy Now
Questions 47

Drag and drop the code from the bottom onto the box where the code is missing to retrieve a summary of physical compute resources. The collected information about the compute resources will be presented in a dashboard to be developed for device monitoring purposes. Not all snippets are used.

350-901 Question 47

Options:

Buy Now
Questions 48

Refer to the exhibit.

350-901 Question 48

A Docker swarm cluster is configured to load balance services across data centers in three different geographical regions west central and east. The cluster has three manager nodes and three worker nodes Anew service named cisco.devnet is being deployed. The service has these design requirements

• All containers must be hosted only on nodes in the central region

• The service must run only on nodes that are ineligible for the manager role

Which approach fulfills the requirements?

Options:

A.

Create a second swarm cluster that is hosted only in the central region.

B.

Create the service manually in the central region and set replicas to 0.

C.

Use placement constraints to control nodes to which the service can be assigned.

D.

Enable the control flag in the containers of the west and east regions to prevent the service from starting

Buy Now
Questions 49

Refer to the exhibit.

350-901 Question 49

Which RESTCONF verb changes the GigabitEthernet2 interface from 192.168.100.1/24 to 10.10.10.1/24

Options:

A.

POST

B.

PATCH

C.

GET

D.

HEAD

Buy Now
Questions 50

Refer to the exhibit.

350-901 Question 50

Which action should be performed to avoid an SQL injection attack?

Options:

A.

Encrypt the password that is used to connect to the database

B.

Develop a denial of service response plan

C.

Vacate the input on the platform variable

D.

Compile the Python file instead of allowing live interpretation

Buy Now
Questions 51

An organization manages a large cloud-deployed application that employs a microservices architecture. No notable issues occur with downtime because the services of this application are redundantly deployed over three or more data center regions. However, several times a week reports are received about application slowness. The container orchestration logs show faults in a variety of containers that cause them to fail and then spin up brand new.

Which action must be taken to improve the resiliency design of the application while maintaining current scale?

Options:

A.

Update the base image of the containers.

B.

Test the execution of the application with another cloud services platform.

C.

Increase the number of containers running per service.

D.

Add consistent “try/catch(exception)” clauses to the code.

Buy Now
Questions 52

350-901 Question 52

Refer to the exhibit Drag and drop the code from the bottom onto the box where the code is missing to query the last 10 Bluetooth clients seen by APs in their network using the Meraki Dashboard API Not all options are used.

350-901 Question 52

Options:

Buy Now
Questions 53

Refer to the exhibit.

350-901 Question 53

An engineer is implementing the response for unrecoverable REST API errors. Which message needs to be placed on the snippet where the code is missing to complete the print statement?

Options:

A.

"Error; The server is unable to handle your request." "Error:

B.

The data requested has not been found."

C.

"Error: The rate limit has been exceeded for sending API requests at this time"

D.

"Enor: The server requires authentication to complete this request."

Buy Now
Questions 54

What is a benefit of implementing a Cl pipeline?

Options:

A.

enforces version control

B.

enables a faster feedback loop

C.

ensures that tests are written before code is written

D.

decreases external dependencies

Buy Now
Exam Code: 350-901
Exam Name: Developing Applications using Cisco Core Platforms and APIs (DEVCOR)
Last Update: Apr 23, 2024
Questions: 363

PDF + Testing Engine

$59.5  $169.99

Testing Engine

$45.5  $129.99
buy now 350-901 testing engine

PDF (Q&A)

$38.5  $109.99
buy now 350-901 pdf
dumpsmate guaranteed to pass
24/7 Customer Support

DumpsMate's team of experts is always available to respond your queries on exam preparation. Get professional answers on any topic of the certification syllabus. Our experts will thoroughly satisfy you.

Site Secure

mcafee secure

TESTED 25 Apr 2024