Labour Day Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70percent

Cisco 350-901 Developing Applications using Cisco Core Platforms and APIs (DEVCOR) Exam Practice Test

Demo: 54 questions
Total 363 questions

Developing Applications using Cisco Core Platforms and APIs (DEVCOR) Questions and Answers

Question 1

An engineer is developing a web-based application that will be used as a central repository for the HR department The application needs to authenticate user access and encrypt communication. Drag and drop the steps from the left into the order on the right to install an application-specific SSL certificate.

Options:

Question 2

Refer to the exhibit.

A Docker swarm cluster is configured to load balance services across data centers in three different geographical regions west central and east. The cluster has three manager nodes and three worker nodes Anew service named cisco.devnet is being deployed. The service has these design requirements

• All containers must be hosted only on nodes in the central region

• The service must run only on nodes that are ineligible for the manager role

Which approach fulfills the requirements?

Options:

A.

Create a second swarm cluster that is hosted only in the central region.

B.

Create the service manually in the central region and set replicas to 0.

C.

Use placement constraints to control nodes to which the service can be assigned.

D.

Enable the control flag in the containers of the west and east regions to prevent the service from starting

Question 3

What is the result of a successful OAuth2 authorization grant flow?

Options:

A.

The user has the application rights that correspond to the user's role within the application's database

B.

The application is provided with a token that allows actions on services on the user's behalf

C.

The user has administrative rights to the application's backend services

D.

The third-party service is provided with a token that allows actions to be performed

Question 4

Refer of the exhibit.

Click on the resource labs in the top left corner to view resources to help with this question The script uses the Cisco Intersight REST API Drag and drop the code from the bottom of the code snippet to the blanks in the code to construct a Python script to update the firmware on a specific Cisco interaght managed UCS rack server, DMZ-RL3ADJM.

Options:

Question 5

An organization manages a large cloud-deployed application that employs a microservices architecture across multiple data centers. Reports have received about application slowness. The container orchestration logs show that faults have been raised in a variety of containers that caused them to fail and then spin up brand new instances.

Which two actions can improve the design of the application to identify the faults? (Choose two.)

Options:

A.

Automatically pull out the container that fails the most over a time period.

B.

Implement a tagging methodology that follows the application execution from service to service.

C.

Add logging on exception and provide immediate notification.

D.

Do a write to the datastore every time there is an application failure.

E.

Implement an SNMP logging system with alerts in case a network link is slow.

Question 6

Which transport protocol is used by gNMI?

Options:

A.

HTTP/2

B.

HTTP 1.1

C.

SSH

D.

MQTT

Question 7

Refer to the exhibit.

A network engineer must integrate error handling tor time-outs on network devices using the REST interface. Which line of code needs to be placed on the snippet where the code is missing to accomplish this task?

Options:

A.

elif resp.status_code == 429 or serf._retries < selff._MAX_RETRIES:

B.

elif resp.status_code == 404 or self, retries < self._MAX_RETRIES:

C.

elif resp.status_code == 429 and self .retries < self._MAX_RETRIES:

D.

elif resp.status_code == 404 and self._relries < self._MAX_RETRIES:

Question 8

A developer must create VLANs 2-5 on a remote Cisco NX-OS switch by using an Ansible playbook The playbook must meet these requirements

• Configure the VLANs and a name for each VLAN

• Only run against the switches inventory group

• Execute from the local Ansible controller

• Prevent the collection of system information prior to execution

Which playbook must be used?

A)

B)

C)

D)

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 9

Refer to the exhibit.

Which parameter is missing from the JSON response to confirm the API version that is

used?

Options:

A.

version 4

B.

v 10

C.

2

D.

version 2

Question 10

What are two principles according to the build, release, run principle of the twelve-factor app methodology?

(Choose two.)

Options:

A.

Code changes are able to be made at runtime.

B.

Separation between the build, release, and run phases.

C.

Releases should have a unique identifier.

D.

Existing releases are able to be mutated after creation.

E.

Release stage is responsible for compilation of assets and binaries.

Question 11

Drag and drop the code from the bottom onto the box where the code is missing to configure a router that runs Cisco IOS XE by using RESTCONF. The API call is made to the management URL of the IOS XE device and on a registered port number. Errors that are caught during HTTP operation are registered. Not all options are used.

Options:

Question 12

Refer to the exhibit.

Drag and drop the steps from the left into the correct order of operation on the right for a successful OAuth2 three-legged authorization code grant flow.

Options:

Question 13

Drag and drop the steps from the left into the order on the right to host a Docker-contained application on a Cisco Catalyst 9000 Series Switch.

Options:

Question 14

Drag and drop the code from the bottom onto the box where the code is missing to permit network traffic between 10.0.0.0/8 and all other networks on port 80 for a Cisco Nexus 9000 switch by using the Puppet module. Not all options are used.

Options:

Question 15

An engineer is developing a Docket container for an application in Python For security reasons the application needs to be accessible on port 5001 only Which line should be added to the dockerfile m order to accomplish this?

Options:

A.

ENTRYPOINT 5001

B.

PORT SRC 5001

C.

ADO PORT 5001

D.

EXPOSE 5001

Question 16

Refer to the exhibit Drag and drop the code from the bottom onto the box where the code is missing to query the last 10 Bluetooth clients seen by APs in their network using the Meraki Dashboard API Not all options are used.

Options:

Question 17

Drag and drop the descriptions from the left onto the related OAuth-defined roles on the right.

Options:

Question 18

Refer to the exhibit above and click on the resource tabs in the top left corner to view resources to help with this question. Drag and drop the correct code snippets from the left onto the item numbers on the right that match the missing sections in the exhibit to complete the cURL script that will use RESTCONF to update an interface on a CISCO IOS XE device.

Options:

Question 19

A developer is creating a Python script to analyze errors during REST API call operations. The script will be used with Cisco solution and devices. Drag and drop the code from the bottom to the box where the code is missing to implement control flow for handling unrecoverable REST API calls. Not all options are used.

Options:

Question 20

Refer to the exhibit.

One part of an application routinely uses the Cisco Meraki API to collate data about all clients Other parts of the application also use the Meraki API, but a single API key is used within the application The organization has approximately 4.000 clients across 30 networks Some of the application users report poor performance and missing data. Which two changes improve the performance of the application? (Choose two.)

Options:

A.

Check for HTTP code 429 and wait until Retry-After time before further calls are made

B.

Configure multiple API keys in the application and rotate usage of each one.

C.

Use random values in the User-Agent header when HTTP calls are made.

D.

Use fewer API calls to create a more efficient endpoint.

E.

Check API response payloads for later reuse in real time during code execution.

Question 21

Refer to the exhibit. Drag and drop the code snippets from the left onto the item numbers on the right that match the missing sections in the curl exhibit to complete the cURL request to FirePower Device Manager API to create objects. Not all code snippets are used.

Options:

Question 22

A developer creates an application for a Cisco Catalyst 9000 switch in a Docker container. Which action must be taken to host the application on the switch?

Options:

A.

Copy the application code to a NETCONF file and upload the file to the switch

B.

Connect the switch to Cisco DNA Center and push the application through the platform.

C.

Use the Cisco IOxClient tool to export the application to a ZIP file and push the file to the switch

D.

Export the application as a TAR file and import the file to the switch

Question 23

Drag and drop the code onto the snippet to update a SSID in Meraki using the Dashboard API. Not all options are used.

Options:

Question 24

What securely stores and encrypts the API keys and tokens that are used for an application deployment?

Options:

A.

ITSM

B.

Artifactory

C.

GitHub

D.

Vault

Question 25

Refer to the exhibit.

A kubeconfig file to manage access to clusters is provided. How many clusters are defined and which of them are accessed using username/password authentication versus certificate?

Options:

A.

two clusters; scratch

B.

three clusters; scratch

C.

three clusters; development

D.

two clusters; development

Question 26

Drag and drop the steps from the left into the order on the right to ensure that an application requiring communication to the external network is hosted on a Cisco Catalyst 9000 switch.

Options:

Question 27

Drag and drop the code from the bottom onto the box where the code is missing to create a new IKEv2 policy Not all options are used

Options:

Question 28

Refer to the exhibit.

The virtual next-generation firewalls running in the public cloud must be scaled out to meet the throughput requirements of the application layer. Which component is deployed to location A in the diagram?

Options:

A.

frontend caching server

B.

forward proxy

C.

backend database

D.

internal load balancer

Question 29

What are two benefits of using a centralized logging service? (Choose two.)

Options:

A.

reduces the time required to query log data across multiple hosts

B.

reduces the loss of logs after a single disk failure

C.

improves application performance by reducing CPU usage

D.

improves application performance by reducing memory usage

E.

provides compression and layout of log data

Question 30

Which security approach should be used for developing a REST API?

Options:

A.

Use custom security relevant HTTP response codes

B.

Utilise TLS for end to end encryption

C.

Add an API key to each URL string

D.

Utilize CORS headers

Question 31

A custom dashboard of the network health must be created by using Cisco DNA Center APIs An existing dashboard is a RESTful API that receives data from Cisco DNA Center as a new metric every time the network health information is sent from the script to the dashboard Which set of requests creates the custom dashboard?

Options:

A.

PUT request to Cisco DNA Center to obtain the network health information and then a POST request to the dashboard to publish the new metric

B.

POST request to Cisco DNA Center to obtain the network health information and then a GET request to the dashboard to publish the new metric

C.

GET request to Cisco DNA Center to obtain the network health information and then a PUT request to the dashboard to publish the new metric

D.

GET request to Cisco DNA Center to obtain the network health information and then a POST request to the dashboard to publish the new metric

Question 32

Refer to the exhibit.

A kubeconfig file to manage access to Kubernetes clusters is shown. How many Kubernetes clusters are defined in the

file, and which cluster FS accessed using username/password authentication rather than using a certificate?

Options:

A.

three dusters; scratch

B.

three clusters: development

C.

two dusters; development

D.

two clusters: scratch

Question 33

Drag and drop the code from the bottom onto the box where the code is missing to provision a new Cisco Unified Computing System server by using the UCS XML API. Options may be used more than once. Not all options are used.

Options:

Question 34

Refer to the exhibit.

An engineer is managing a network that consists of Cisco IOSXE devices. There is a need to retrieve the details of the interface GigabitEthernet2 using RESTCONF. Which URI will accomplish this by providing the same response as shown in the JSON body?

A)

B)

C)

D)

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 35

Refer to the exhibit.

An engineer is configuring Ansible to run playbooks against Cisco IOS XE Software. What

should be configured in ansible.cfg as the connection type?

Options:

A.

network_cli

B.

ssh

C.

shell

D.

command

Question 36

A developer needs to build a new Docker image and has created a tag by using the command:

$ docker tag 32df423320458 local/app.1.2

Which command must be executed next to build the Docker image using the tag?

A)

B)

C)

D)

Options:

A.

Option

B.

Option

C.

Option

D.

Option

Question 37

Which two design considerations should be considered when building a Cisco Meraki dashboard out of available APIs? (Choose two,)

Options:

A.

API call volume is rate-limited to five calls per second per organization.

B.

The API version does not need to be specified in the URL.

C.

Access to the API must first be enabled by using the settings for an organization.

D.

The API requests require the key and the user credentials.

E.

If the API key is shared, it cannot be regenerated

Question 38

Refer to the exhibit above and click on the tab in the top left corner to view a diagram that describes the typical flow of requests involved when a webhook is created for a booking service. Drag and drop the requests from the left onto the item numbers on the right that match the missing sections in the sequence diagram to design the complete flow of requests involved as a booking is updated from a web application.

Options:

Question 39

Drag and drop the code snippets from the bottom onto the boxes where the code is missing to deploy three Cisco UCS servers each from a different template Not all options ate used.

Options:

Question 40

Refer to the exhibit.

Drag and drop the components from the Oauth2 authorization protocol flow on the left onto the letter that matches the location in the exhibit.

Options:

Question 41

User report that they can no longer process transactions with the online ordering application, and the logging dashboard is displaying these messages.

Fri Jan 10 19:37:31.123 EST 2020 [FRONTEND] INFO: Incoming request to add item to cart from user 45834534858

Fri Jan 10 19:37:31 247 EST 2020 [BACKEND] INFO: Attempting to add item to cart

Fri Jan 10 19:37:31 250 EST 2020 [BACKEND] ERROR: Failed to add item: MYSQLDB ERROR: Connection refused

What is causing the problem seen in these log messages?

Options:

A.

The database server container has crashed.

B.

The backend process is overwhelmed with too many transactions.

C.

The backend is not authorized to commit to the database.

D.

The user is not authorized to add the item to their cart.

Question 42

Drag and drop the operations from the left into the order on the right to create a web dashboard that displays Cisco DNA Center data for an organization.

Options:

Question 43

A developer has issued git add file1 and file2 test.py command to add the three files for the next commit, but then decides to executed test.py from this command. Which command needs to be used to exclude test.py from this commit but keep the rest of the files?

Options:

A.

git clean — test.py

B.

git reset - test py

C.

git checkout - file1 file2

D.

git stash -- file1 file 2

Question 44

Refer to the exhibit. The self-service Webex Teams bot is failing when many users attempt to interact with it at the same time. Drag and drop the code snippets from the left onto the correct item numbers on the right that match the missing sections in the exhibit to complete this code to handle this high-load situation.

Options:

Question 45

Refer to the exhibit.

Drag and drop the code snippets from the left onto the item numbers on the right that match the missing sections in the exhibit to complete the script to implement control flow.

Options:

Question 46

What are two methods for sending bearer access tokens in resource requests to servers? (Choose two,)

Options:

A.

in plaintext for user access

B.

in the HTTP API schema

C.

in the HTTP request entity-body

D.

in the "Authorization" request header field

E.

in the HTTP request URI

Question 47

Refer to the exhibit.

Drag and drop the code from the bottom onto the box where the code is missing to construct a Python script that will retrieve location data Not all options are used.

Options:

Question 48

Which two data encoding techniques are supported by gRPC? (Choose two.)

Options:

A.

XML

B.

JSON

C.

ASCII

D.

ProtoBuf

E.

YAML

Question 49

Drag and drop the code from the bottom onto the box where the code is missing to retrieve and display wireless network hearth information. The wireless network devices are being managed by Cisco DNA Center and are compatible with REST API Not all options are used.

Options:

Question 50

Which database type should be used to store data received from model-driven telemetry?

Options:

A.

BigQuery database

B.

Time series database

C.

NoSQL database

D.

PostgreSQL database

Question 51

An application must be able to print the values of the variables in specific modules. Different message levels will be used for production and for development. Proof of access and activity must be documented. What must be included in the implementation to support these observability requirements?

Options:

A.

print

B.

metrics

C.

logging

D.

streaming

Question 52

Refer to the exhibit.

Drag and drop the correct parts of the Dockerfile from the left onto the item numbers on the right that match the missing sections in the exhibit to complete the Dockerfile to successfully build and deploy a container running a Python application. Not all parts of the Dockerfile are used.

Options:

Question 53

Where mus! the data be encrypted to ensure end-to-end encryption when using an API?

Options:

A.

on the device that consumes the API

B.

on the source device before transmission

C.

on the end device after a request is received

D.

on the server that stores the data

Question 54

An application is developed in order to communicate with Cisco Webex. For reporting, the application must retrieve all the messages sent to a Cisco Webex room on a monthly basis.

Which action calls /v1/messages directly?

Options:

A.

Set up a webhook that has messages as the resource type and store the results locally.

B.

Utilize the pagination functionality by defining the max property.

C.

Recursively call the /vl/messages endpoint by using the beforeMessage property.

D.

Filter the response results by specifying the created property in the request.

Demo: 54 questions
Total 363 questions