Month End Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dumps65

Cisco 350-901 Dumps

Page: 1 / 36
Total 363 questions

Developing Applications using Cisco Core Platforms and APIs (DEVCOR) Questions and Answers

Question 1

A container running a Python script is failing when it reaches the integration testing phase of the CI/CD process. The code has been reviewed thoroughly and the build process works on this container and all other containers pass unit and integration testing.

What should be verified to resolve the issue?

Options:

A.

that the correct port is exposed in the Dockerfile

B.

that the necessary modules and packages are installed on build

C.

that the script is running from the right directory

D.

that the Python version of the container image is correct

Question 2

Which load balancing algorithm balances load based on the active sessions of a node?

Options:

A.

weighted round-robin

B.

IP source affinity

C.

least connections

D.

sticky session

Question 3

Refer to the exhibit.

as

A network engineer created a simple Python Flask application but must incorporate a CSRF token. Which code snippet must be added in the blank in the script to manually incorporate the token?

Options:

A.

_access_tokenM value=M{{ csrf_token}}

B.

_csrMoken" value="{{ csrf_grant()}}

C.

_csrMoken" value="{{ csrf_token()}}

D.

_xssjoken" value="{{ csrMoken}}

Question 4

Which Puppet manifest changes the NTP server and generates the traffic from VLAN 15?

A)

as

B)

as

C)

as

D)

as

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 5

A developer IS deploying an action to automate the configuration and management of Cisco network switches and routers. The application must use REST API interlace to achieve programmability. The security team mandates that the network must be protected against DDoS attacks. What mitigates the attacks without impacting genuine requests?

Options:

A.

traffic routing on the network perimeter

B.

firewall on the network perimeter

C.

API rate limiting at the application layer

D.

IP address filtering at the application layer

Question 6

Which transport layer protocol does gRPC use to retrieve telemetry information?

Options:

A.

SSH

B.

SNMP

C.

TCP

D.

HTTP/2

Question 7

Which RFC5988 (Web Linking) relation type is used in the Link header to control pagination in APIs?

Options:

A.

rel=”index”

B.

rel=”page”

C.

rel=”next”

D.

rel=”section”

Question 8

Users report that they are no longer able to process transactions with the online ordering application, and the logging dashboard is

displaying these messages:

Fri Jan 10 19:37:31.123 ESI 2020 [FRONTEND] [NFO: Incoming request to add item to cart from user 45834534858

Fri Jan 10 19:37:31.247 EST 2020 [BACKEND] INFO: Attempting to add item to cart

Fri Jan 10 19:37:31.250 EST 2020 [BACKEND] ERROR: Failed to add item: MYSQLDB ERROR: Connection refused

What is causing the problem seen in these log messages?

Options:

A.

The database server container has crashed.

B.

The backend process is overwhelmed with too many transactions.

C.

The backend is not authorized to commit to the database.

D.

The user is not authorized to add the item to their cart.

Question 9

Refer to the exhibit.

as

Drag and drop the code snippets from the left onto the item numbers on the right that match the missing sections in the cURL exhibit to complete the cURL request to FirePower Device Manager API to create objects. Not all code snippets are used.

as

Options:

Question 10

A developer has created a local Docker alpine image that has the image ID 'dockapp432195596ffr' and tagged as ‘new’. Which command creates a running container based on the tagged image, with the container port 80 bound to port 8080 on the host?

Options:

A.

docker build -p 8080:80 alpine new

B.

docker exec -p 808080 alpine new

C.

docker start -p 808080 alpine new

D.

docker run -p 8080.80 alpine.now

Question 11

Which statement about microservices architecture is true?

Options:

A.

Applications are written in a single unit.

B.

It is a complex application composed of multiple independent parts.

C.

It is often a challenge to scale individual parts.

D.

A single faulty service can bring the whole application down.

Question 12

What are two principles according to the build, release, run principle of the twelve-factor app methodology?

(Choose two.)

Options:

A.

Code changes are able to be made at runtime.

B.

Separation between the build, release, and run phases.

C.

Releases should have a unique identifier.

D.

Existing releases are able to be mutated after creation.

E.

Release stage is responsible for compilation of assets and binaries.

Question 13

A developer deploys a web application in a local data center that is now experiencing high traffic load from users accessing data through REST API calls. Which approach enhances the responsiveness and performance of the API?

Options:

A.

Use HTTP POST or other non-read methods for read requests when possible

B.

Ensure that all read requests are clearly identified by the PUT method

C.

Configure API payload to return errors in HTTP 200 responses

D.

Use HTTP standard authorization header to submit authentication credentials

Question 14

Drag and drop the code from the bottom onto the box where the code is missing to provision a new Cisco Unified Computing System server by using the UCS XML API. Options may be used more than once. Not all options are used.

as

Options:

Question 15

Drag and drop the steps from the left into the order on the right to host a Docker-contained application on a Cisco Catalyst 9000 Series Switch.

as

Options:

Question 16

A network engineer needs to retrieve interface data using the Cisco IOS XE YANG Model. Drag and drop the

components from the bottom onto the box where the code is missing to complete the RESTCONF URI. Not all

options are used.

as

Options:

Question 17

AppGigabitEthernet interface is used as data port for a container on a Cisco Catalyst 9000 Series Switch. Which two interface configuration options should be used? (Choose two.)

Options:

A.

trunk interface

B.

bridged virtual interface

C.

SPAN port

D.

management interface

E.

subinterface

Question 18

An application is made up of multiple microservices, each communicating via APIs. One service is beginning to be a bottleneck for the application because it can take a lot of time to complete requests. An engineer tried adding additional instances of this service behind the load balancer, but it did not have any effect. Which application design change must be implemented m this scenario?

Options:

A.

Move from synchronous to asynchronous interactions with the service and implement a message queue.

B.

Deploy an API gateway to centralize all inbound communication requests and offload authentication

C.

Vendor all dependencies into the service that is causing delays to remove external dependency checks.

D.

Leverage serverless architecture instead of containers to gain the advantage of event driven APIs.

Question 19

Refer to the exhibit.

as

Which key value pair from the ios_ntp Ansible module creates an NTP server peer?

Options:

A.

state: present

B.

state: True

C.

config: present

D.

config: True

Question 20

Which security approach should be used for developing a REST API?

Options:

A.

Use custom security relevant HTTP response codes

B.

Utilise TLS for end to end encryption

C.

Add an API key to each URL string

D.

Utilize CORS headers

Question 21

Refer to the exhibit.

as

This snippet of a script has recently started exiting abnormally with an exception stating “Unexpected HTTP Response code: 429”.

Which solution handles rate limiting by the remote API?

as

as

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 22

What is a characteristic of event-driven architecture?

Options:

A.

separates the models for the reading and writing of data

B.

allows for loose coupling between software components

C.

breaks a solution into parts according to business capability

D.

provides a single point of reference for mastering data

Question 23

as

Refer to the exhibit. Which command resolves the merge conflict by removing the previous commit from the commit history?

as

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 24

An engineer must enable an SSID in a Meraki network. Which request accomplishes this task?

Options:

A.

PUT /networks/{networkld}/ssids/{number} {"enable": true)

B.

POST /networks/{networkid}/ssids/{number) {"enable": true)

C.

PUT /networks/{networkld}/ssids/{number}?enabled=true

D.

POST /networks/{networkid}/sslds/{number}?enabled=true

Question 25

An engineer is developing a Docket container for an application in Python For security reasons the application needs to be accessible on port 5001 only Which line should be added to the dockerfile m order to accomplish this?

Options:

A.

ENTRYPOINT 5001

B.

PORT SRC 5001

C.

ADO PORT 5001

D.

EXPOSE 5001

Question 26

Drag and drop the code from the bottom onto the box where the code is missing to create a new IKEv2 policy Not all options are used

as

Options:

Question 27

Refer to the exhibit.

as

A Python script must list network clients in the Cisco Meraki API that have used a network with an ID of 2 The number of client entries per returned page is restricted to 1.000 according to the API specification Network 2 has 2.500 clients What must be added where the code is missing to print the content of each response?

A)

as

B)

as

C)

as

D)

as

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 28

Refer to the exhibit.

as

A company has extended networking from the data center to the cloud through Transit VPC.

Which two statements describe the benefits of this approach? (Choose two.)

Options:

A.

Dynamic routing combined with multi-AZ- deployment creates a robust network infrastructure.

B.

VPC virtual gateways provide highly available connections to virtual networks.

C.

Dedicated VPC simplifies load balancing by combining internal and external web services.

D.

VPC virtual gateways provide more secure connections to virtual networks.

E.

Dedicated VPC simplifies routing by not combining this service with other shared services.

Question 29

Refer to the exhibit.

as

An engineer needs to change the IP address via RESTCOMF on interface GigabitEthernet2. An error message is received when the script is run. Which amendment to the code will result in a successful RESTCONF action?

Options:

A.

Change POST to PATCH.

B.

Issue a DELETE before POST.

C.

Issue a DELETE before PATCH

D.

Change POST to GET

Question 30

Which two principles are included in the codebase tenet of the 12-factor app methodology? (Choose two.)

Options:

A.

An application is always tracked in a version control system.

B.

There are multiple codebases per application.

C.

The codebase is the same across all deploys.

D.

There can be a many-to-one correlation between codebase and application.

E.

It is only possible to have one application deployment per codebase.

Question 31

Refer to the exhibit.

as

An application has been created to serve a whole enterprise. Based on use and department requirements, changes are requested on a quarterly basis. When evaluating the application design, which two actions improve code maintainability?

Options:

A.

Replace the requests library with the http client library in the code.

B.

Place all import statements on a single line at the top of the code.

C.

Cache responses to API calls for later reuse on other code.

D.

Parameterize similar code blocks inside functions and reuse within the code.

E.

Add comments in appropriate locations to aid in understanding the code.

Question 32

Which two statements describe advantages of static code analysis over unit tests? (Choose two.)

Options:

A.

It checks for potential tainted data where input is not checked.

B.

It enforces proper coding standards and style.

C.

It performs a quick analysis of whether tests will pass or fail when run.

D.

It checks for race conditions in threaded applications.

E.

It estimates the performance of the code when run.

Question 33

The UCS Python SDK includes modules for Service Profile template creation. Which two UCS Service Profile template types are supported? (Choose two.)

Options:

A.

initial-template

B.

updating-template

C.

abstract-template

D.

attached-template

E.

base-template

Question 34

What are two benefits of using a centralized logging service? (Choose two.)

Options:

A.

reduces the time required to query log data across multiple hosts

B.

reduces the loss of logs after a single disk failure

C.

improves application performance by reducing CPU usage

D.

improves application performance by reducing memory usage

E.

provides compression and layout of log data

Question 35

An application must be able to print the values of the variables in specific modules. Different message levels will be used for production and for development. Proof of access and activity must be documented. What must be included in the implementation to support these observability requirements?

Options:

A.

print

B.

metrics

C.

logging

D.

streaming

Question 36

Refer to the exhibit.

as

Which code snippet must be added to the blank in the code to automate the evaluation and handling of errors due to wrong credentials when Basic Authorization is used?

A)

as

B)

as

C)

as

D)

as

Options:

A.

Option

B.

Option

C.

Option

D.

Option

Question 37

Which two types of storage are supported for app hosting on a Cisco Catalyst 9000 Series Switch? (Choose two.)

Options:

A.

external USB storage

B.

internal SSD

C.

CD-ROM

D.

SD-card

E.

bootflash

Question 38

DRAG DROP

as

Refer to the exhibit above and click on the resource tabs in the top left corner to view resources to help with this question.

as

as

A developer is creating a Python Script that will use the Webex Teams REST API to automatically create a new collaboration space with him and his team leads on-demand via a Linux terminal command. Drag and drop the code snippets from the left onto the numbers on the right that match the missing sections in the exhibit to complete the script. Not all code snippets are used.

as

Options:

Question 39

Which two design considerations should be considered when building a Cisco Meraki dashboard out of available APIs? (Choose two,)

Options:

A.

API call volume is rate-limited to five calls per second per organization.

B.

The API version does not need to be specified in the URL.

C.

Access to the API must first be enabled by using the settings for an organization.

D.

The API requests require the key and the user credentials.

E.

If the API key is shared, it cannot be regenerated

Question 40

Drag and drop the code from the bottom onto the box where the code is missing to enable an SSID by using the Cisco Meraki Dashboard API. Not all options are used.

as

Options:

Question 41

Refer to the exhibit.

as

Drag and drop the parts of the Python code from the left onto the item numbers on the right that match the missing sections in the exhibit that consumes REST API pagination.

as

Options:

Question 42

Refer to the exhibit.

as

A network engineer needs to handle API errors in their requests when users do not have permission to access the resource, even if they are authenticated and authorized. Which line of code needs to be placed on the snippet where the code is missing to handle these API errors?

Options:

A.

if r.status_code == 403

B.

il if r.raise for status() == 403

C.

if r.raise for_status() = 401

D.

if r.status_code = 401

Question 43

A developer in a learn of distributed authors is working on code in an isolated Git branch named 'update4a2f5464771 The developer attempts to merge the new code with a branch named ’dvcapp2a3f1564733' however the merge operation encounters a conflict error during the process. Which Git command must the developer use to exit from the merge process and return the branch to the previous state?

Options:

A.

git merge -exit

B.

git merge -abort

C.

git abort —merge

D.

git abort -status

Question 44

An application has been developed for monitoring rooms in Cisco Webex. An engineer uses the application to

retrieve all the messages from a Cisco Webex room, but the results are slowly presented. Which action

optimizes calls to retrieve the messages from the /v1/messages endpoint?

Options:

A.

Define the ma property by using the pagination functionality.

B.

Set the beforeMessage property to retrieve the messages sent before a specific message ID.

C.

Avoid unnecessary calls by using a prior request to /v1/rooms to retrieve the last activity property.

D.

Filter the response results by specifying the created property in the request.

Question 45

Refer to the exhibit.

as

Which word is missing from this Ansible playbook shown, to allow the Cisco IOS XE commands for router configuration to be pushed after the playbook is executed?

Options:

A.

Commands

B.

Input

C.

Lines

D.

cofig

Question 46

Refer to the exhibit.

as

A network engineer writes a script to test authentication workflow using Python and REST API. The engineer wants to ensure that the script handles expected errors by matching output to HTTP status codes The scnpt uses the Python requests module. Which line of code must be added on the snippet where the code is missing?

Options:

A.

requests.error_code

B.

response.sutus_code

C.

response

D.

requests.post

Question 47

While developing an application following the 12-factor app methodology, which approach should be used in the application for logging?

Options:

A.

Write a log to a file in the application directory.

B.

Write a log to a file in /var/log.

C.

Write the logs buffered to stdout.

D.

Write the logs unbuffered to stdout.

Question 48

Refer to the exhibit.

as

An application is being developed as an information repository. The application will be used to store details about television shows, including the scenario, year, and category. Which database type must used for high performance for the data structure?

Options:

A.

time series

B.

Eidocument-based

C.

graph

D.

columnar

Question 49

While working with the Webex Teams API, on an application that uses end-to-end encryption, a webhook has

been received. What must be considered to read the message?

Options:

A.

Webhook information cannot be used to read the message because of end-to-end encryption. The API key

is needed to decrypt the message.

B.

Webhook returns the full unencrypted message. Only the body is needed to query the API.

C.

Webhook returns a hashed version of the message that must be unhashed with the API key.

D.

Webhook returns message identification. To query, the API is needed for that message to get the decrypted

information.

Question 50

Refer to the exhibit.

as

An engineer creates an application that leverages the Ansible framework to provision CPE endpoints that have configuration changes. The application contains an Ansible playbook named provision_cpes.yml that uses the ansible.builtin.script Ansible module to execute these two Python scripts:

•gather and_create.py. which creates a JSON file named bios.json that contains the CPE models and their respective IOS file information

•load and parse.py. which loads the file data and parses it for later consumption

After several successful runs, the application fails. During a review of the Ansible execution logs, the engineer discovers an error output that indicates that one of the stages failed. What is the cause of this issue?

Options:

A.

ansible builtm script Ansible module

B.

gather and create.py Python script

C.

load_and_parse.py Python script

D.

provision cpes.yml Ansibte playbook

Question 51

A team is developing a cloud-native application for network monitoring and management of various devices. An increased growth rate of users is expected. The solution must be easily managed and meet these requirements:

•able to use dependencies

•easy disposability

•flexible configuration

Which application design approach must be used?

Options:

A.

waterfall model

B.

12-factor app framework

C.

object-oriented programming

D.

agile software development

Question 52

Drag and drop the code from the bottom onto the box where the code is missing to delete a host object by using the Cisco Firepower Device Manager API Not all options are used.

as

Options:

Question 53

Drag and drop the code from the bottom onto the box where the code is missing to list objects that use the paginated Cisco FDM API. Some options may be used more than once. Not all options are used.

as

Options:

Question 54

Which two statements about a stateless application are true? (Choose two.)

Options:

A.

Different requests can be processed by different servers.

B.

Requests are based only on information relayed with each request.

C.

Information about earlier requests must be kept and must be accessible.

D.

The same server must be used to process all requests that are linked to the same state.

E.

No state information can be shared across servers.

Page: 1 / 36
Total 363 questions