Labour Day Special - Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: top65certs

Cisco 350-901 Dumps

Page: 1 / 14
Total 363 questions

Developing Applications using Cisco Core Platforms and APIs (DEVCOR) Questions and Answers

Question 1

Drag and drop the steps from the left into the order on the right to host a Docker-contained application on a Cisco Catalyst 9000 Series Switch.

Options:

Question 2

Refer to the exhibit Drag and drop the code snippets from the left onto the item numbers on the right that match the missing sections in the exhibit to complete the script to implement control flow.

Options:

Question 3

Refer to the exhibit.

An engineer needs to implement REST API error handling when a timeout or rate limit scenario is present. Which code snippet must be placed into the blank in the code to complete the API request?

A)

B)

C)

D)

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 4

Drag and drop the steps from the left into the sequence on the fight to implement an OAuth2 three-legged authorization code flow grant type in an application Not all options are used.

Options:

Question 5

Which HTTP status code indicates that a client application is experiencing intentional rate limiting by the server?

Options:

A.

202

B.

401

C.

429

D.

503

Question 6

Refer to the exhibit.

A)

B)

C)

D)

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 7

An engineer must enable an SSID in a Meraki network. Which request accomplishes this task?

Options:

A.

PUT /networks/{networkld}/ssids/{number} {"enable": true)

B.

POST /networks/{networkid}/ssids/{number) {"enable": true)

C.

PUT /networks/{networkld}/ssids/{number}?enabled=true

D.

POST /networks/{networkid}/sslds/{number}?enabled=true

Question 8

What is submitted when an SSL certificate is requested?

Options:

A.

PEM

B.

CRT

C.

DER

D.

CSR

Question 9

What is the result of a successful OAuth2 authorization grant flow?

Options:

A.

The user has the application rights that correspond to the user's role within the application's database

B.

The application is provided with a token that allows actions on services on the user's behalf

C.

The user has administrative rights to the application's backend services

D.

The third-party service is provided with a token that allows actions to be performed

Question 10

An engineer is developing a web-based application that will be used as a central repository for the HR department The application needs to authenticate user access and encrypt communication. Drag and drop the steps from the left into the order on the right to install an application-specific SSL certificate.

Options:

Question 11

Refer to the exhibit. Which URI string retrieves configured static routes in a VRF named CUSTOMER from a RESTCONF-enabled device?

A)

B)

C)

D)

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 12

Refer to the exhibit.

An engineer writes a script to retrieve data from a REST API and must build support for cases where the response that contains data from the server may take a longer time than normal Which code must be added to the snippet where the code is missing to catch such a timeout?

Options:

A.

request.exeception.ConnectTimeout

B.

request.executions.DataTimeout

C.

request.exeception.HTTPError

D.

request.exception.ReadTimeout

Question 13

An engineer needs to automate the configuration on a Cisco NX-OS switch. The solution must meet these requirements:

•Ansible is used

•The transport protocol is encrypted

•Support for Asynchronous requests.

Which two access mechanisms must be used? (Choose two.)

Options:

A.

SNMP Version 2c

B.

NETCONF

C.

NX-API

D.

HTTPS

E.

JSON-RPC

Question 14

Given an application that implements a basic search function as Well as a video upload function , which two load-balancing approaches

optimize the application's user experience? (Choose two.)

Options:

A.

Video upload requests should be routed to the endpoint using an intermediate hop.

B.

Video upload requests should be routed to the endpoint with highest data throughput.

C.

Video upload requests should be routed to the endpoint with lowest round-trip latency.

D.

Search requests should be routed to the endpoint with lowest round-trip latency.

E.

Search requests should be routed to the endpoint with highest data throughput.

Question 15

Refer to the exhibit.

A developer is creating a Python script by using Cisco DNA Center APIs Drag and drop the code from the bottom onto the box where the code is missing in the Python script to retrieve and display wireless health information for each site Not all options are used.

Options:

Question 16

A developer is creating a Python script to use the Webex Teams REST API to list joined spaces, and gracefully handle and print the errors it receives. Drag and drop the code snippets from the left onto the item numbers on the right that match the missing sections in the exhibit to complete the script.

Options:

Question 17

Click on the resource lab in the top left comer to view resources to help with this question An engineer is managing a data center with 6000 Cisco UCS servers installed and running The engineer is asked to identify all resources where the model is in the UCSB family and the available memory is less than or equal to 5 GB Drag and drop the code from the bottom onto the blanks in the code snippet to construct a REST API call to accomplish this task Not all options are used.

Options:

Question 18

How is client code that consumes gRPC telemetry implemented, assuming that the preferred language is able to be chosen?

Options:

A.

Parse the OpenAPI spec model

B.

Compile the protocol buffers IDL

C.

Leverage a Thrift code generator to parse a Thrift IDL

D.

Review the Swagger API documentation to build client code

Question 19

Refer to the exhibit.

A Python developer is creating a wireless network device inventory application for local deployment of Cisco access points The developer is retrieving an access point ID by using a REST API The output indicates that there was a KeyError when parsing the JSON response. What returns the expected output of 266 at line 14?

A)

B)

C)

D)

Options:

A.

Option

B.

Option

C.

Option

D.

Option

Question 20

Refer to the exhibit.

An application has been created to serve a whole enterprise. Based on use and department requirements, changes are requested on a quarterly basis. When evaluating the application design, which two actions improve code maintainability?

Options:

A.

Replace the requests library with the http client library in the code.

B.

Place all import statements on a single line at the top of the code.

C.

Cache responses to API calls for later reuse on other code.

D.

Parameterize similar code blocks inside functions and reuse within the code.

E.

Add comments in appropriate locations to aid in understanding the code.

Question 21

An application is being built to collect and display telemetry streaming data. Drag and drop the elements of this stack from the left onto the correct element functions on the right.

Options:

Question 22

What is an effective logging strategy according 10 the 12-factor app tenets?

Options:

A.

Capture togs by the execution environment and route to a centralized destination

B.

Tag and save togs in a local document database that has querying capabilities.

C.

Back up log files in a high-availability remote cluster on the public cloud

D.

Timestamp and save logs in a local time-series database that has querying capabilities

Question 23

Which two statements are considered best practices according to the 12-factor app methodology for application design? (Choose two.)

Options:

A.

Application code writes its event stream to stdout.

B.

Application log streams are archived in multiple replicated databases.

C.

Application log streams are sent to log indexing and analysis systems.

D.

Application code writes its event stream to specific log files.

E.

Log files are aggregated into a single file on individual nodes.

Question 24

Refer to the exhibit.

Which code snippet is required in the headers to successfully authorize wireless information from Cisco DNA Center?

Options:

A.

headers = {‘X-auth-token’:’fa8426a0-8eaf-4d22-8e13-7c1b16a9370c’}

B.

headers = {‘Authorization’:’Basic YWRtaW46R3JhcGV2aW5IMQ==’}

C.

headers = {‘Authorization’:’Bearer ASDNFALKJER23412RKDALSNKF”}

D.

headers = {‘Content-type’:’application/json}

Question 25

An engineer is developing a Docket container for an application in Python For security reasons the application needs to be accessible on port 5001 only Which line should be added to the dockerfile m order to accomplish this?

Options:

A.

ENTRYPOINT 5001

B.

PORT SRC 5001

C.

ADO PORT 5001

D.

EXPOSE 5001

Question 26

A developer releases a new application for network automation of Cisco devices deployed m a local data center. The application utilizes complex design patterns such as microservices that host multiple third-party libraries and programming languages. The development must be simplified by implementing an observability-driven development lifecycle. Which two considerations must be taken to meet the requirements? (Choose two.)

Options:

A.

description of low-level errors

B.

which KPls to monitor

C.

relevant metrics to expose

D.

which monitoring tools to use

E.

identifying customer priorities

Question 27

Refer to the exhibit. A developer wants to automatically deploy infrastructure for a containerized application. A .gitlab-ci.yml file must describe a pipeline that builds a container based on a supplied Dockerfile and executes an Ansible playbook on the configured container. What must be added where the code S missing to complete the script?

A)

B)

C)

D)

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 28

Drag and drop the code from the bottom onto the box where the code is missing to construct a contact tracking application that dynamically returns all the Bluetooth clients on a given Meraki network. Not all options are used.

Options:

Question 29

A developer is building an application to access a website. When running the application, an HTTP 403 error

code has been received. How should the application be modified to handle this code?

Options:

A.

Create a loop on cancel the operation and run a new one after the code is received.

B.

Use exponential backoff when retrying distributed services and other remote endpoints.

C.

Build a try/except around the urlopen to find errors occurring in the request.

D.

Redirect the request to an internal web server and make a new request from the internal resource.

Question 30

A developer deploys a web application in a local data center that is now experiencing high traffic load from users accessing data through REST API calls. Which approach enhances the responsiveness and performance of the API?

Options:

A.

Use HTTP POST or other non-read methods for read requests when possible

B.

Ensure that all read requests are clearly identified by the PUT method

C.

Configure API payload to return errors in HTTP 200 responses

D.

Use HTTP standard authorization header to submit authentication credentials

Question 31

Drag and drop the code from the bottom onto the box where the code is missing in the Python script to execute a REST API call to query all the NTP policy names and print the name of each policy. Not all options are used.

Options:

Question 32

A user is receiving a 429 Too Many Requests error. Which scheme is the server employing that causes this error?

Options:

A.

rate limiting

B.

time outs

C.

caching

D.

redirection

Question 33

Drag and drop the code from the bottom onto the box where the code is missing to delete a host object by using the Cisco Firepower Device Manager API Not all options are used.

Options:

Question 34

Refer to the exhibit. Which snippet creates a Webex Teams space and adds the users in the variable user list to that space?

A)

B)

C)

D)

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 35

A local Docker container with a Container ID of 391441516e7a is running a Python application. Which

command is used to connect to a bash shell in the running container?

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 36

Refer to the exhibit.

One part of an application routinely uses the Cisco Meraki API to collate data about all clients Other parts of the application also use the Meraki API, but a single API key is used within the application The organization has approximately 4.000 clients across 30 networks Some of the application users report poor performance and missing data. Which two changes improve the performance of the application? (Choose two.)

Options:

A.

Check for HTTP code 429 and wait until Retry-After time before further calls are made

B.

Configure multiple API keys in the application and rotate usage of each one.

C.

Use random values in the User-Agent header when HTTP calls are made.

D.

Use fewer API calls to create a more efficient endpoint.

E.

Check API response payloads for later reuse in real time during code execution.

Question 37

Refer to the exhibit.

A network engineer developed an Ansible playbook and committed it to GitLab. A GitLab CI pipeline is started but immediately fails. What is the issue?

Options:

A.

The runner task uses an incorrect parameter.

B.

The Ansible playbook task has a formatting issue.

C.

The Ansible playbook has an undefined variable.

D.

The runner is running the wrong Docker version.

Question 38

Refer to the exhibit.

A developer must configure an SSL certificate for an nginx web server Which code must be added on the script to accomplish this configuration?

A)

B)

C)

D)

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 39

{'lat': 37.4180951010362, 'lng': -122.098531723022, 'address': '', 'serial': 'Q2HP-F5K5-F98Q',

'mac': '88:15:44:ea:f5:bf', 'lanIp': '10.10.10.15',

'url': 'https://n149.meraki.com/DevNet-Sandbox/n/EFZDavc/manage/nodes/new_list/78214561218351',

'model': 'MS220-8P', 'switchProfileId': None, 'firmware': 'switch-11-31', 'floorPlanId': None}

Refer to the exhibit. A developer needs to find the geographical coordinates of a device on the network L_397561557481105433 using a Python script to query the Meraki API. After running response = requests.get() against the Meraki API, the value of response.text is shown in the exhibit.

What Python code is needed to retrieve the longitude and latitude coordinates of the device?

Options:

A.

latitude = response.text['lat']

longitude = response.text['lng']

B.

latitude = response.json()['lat']

longitude = response.json()['lng']

C.

latitude = response.json()[0]

longitude = response.json()[1]

D.

latitude = response.text[0]

longitude = response.text[1]

Question 40

Refer to the exhibit above and click on the tab in the top left corner to view a diagram that describes the typical flow of requests involved when a webhook is created for a booking service. Drag and drop the requests from the left onto the item numbers on the right that match the missing sections in the sequence diagram to design the complete flow of requests involved as a booking is updated from a web application.

Options:

Question 41

Which two situations are flagged by software tools designed for dependency checking in continuous integration environments, such as OWASP? (Choose two.)

Options:

A.

publicly disclosed vulnerabilities related to the included dependencies

B.

mismatches in coding styles and conventions in the included dependencies

C.

incompatible licenses in the included dependencies

D.

test case failures introduced by bugs in the included dependencies

E.

buffer overflows to occur as the result of a combination of the included dependencies

Question 42

Refer to the exhibit above and click on the IETF Routing tab in the top left corner to help with this question. A developer is trying to update the routing instance by adding a new route to the routes list using the URL in the exhibit. What action must be taken to fix the error being received?

Options:

A.

Fix the body being sent to update the routes list.

B.

Update the authorization credentials.

C.

Change the url to ''/ietf-routing:routing/routing-instance=default''.

D.

Change the URL to ''/ietf-routing:routing-instance/default''.

E.

Change the HTTP Method being used to make the change

Question 43

DRAG DROP

Refer to the exhibit. A system administrator has installed a Linux-based alarm system in their home that can execute a Bash shell script when an intruder is detected. Drag and drop the code snippets from the left onto the item numbers on the right that match the missing sections in the exhibit to create a chat-ops script that will notify of alarms via the Webex Teams REST API. Not all code snippets are used.

Options:

Question 44

Which command is used 10 enable application hosting on a Cisco IOS XE device?

Options:

A.

iox

B.

iox-service

C.

application -honing

D.

app- hosting

Question 45

Drag and drop the code from the bottom onto the box where the code is missing to retrieve a summary of physical compute resources. The collected information about the compute resources will be presented in a dashboard to be developed for device monitoring purposes. Not all snippets are used.

Options:

Question 46

An application has these characteristics

• provide one service or function

• distributed database

• API gateway

• central repository for code

• configuration database

• uses session management

Which two design approaches contribute to the scalability of the application? (Choose two.)

Options:

A.

built to scale based on a star topology

B.

modular design iteration

C.

session management in a stateless architecture

D.

planned before the first device is deployed

E.

distributed computing with tightly coupled components

Question 47

Drag and drop the steps from the left into the order on the right to create the workflow to retrieve the gateway information from a set of Cisco IOS devices. Not all options are used.

Options:

Question 48

A timeframe custom dashboard must be developed to present data collected from Cisco Meraki. The dashboard must include a wireless health alert count. What needs to be built as a prerequisite?

Options:

A.

A publicly available HTTP server to receive Meraki Webhooks from the Meraki Dashboard API

B.

A publicly available HTTP server to receive Meraki Webhooks from the Meraki Scanning API

C.

A daemon to consume the Wireless Health endpoint of the Meraki Scanning API

D.

A daemon to consume the Wireless Health endpoint of the Meraki Dashboard API

Question 49

Refer to the exhibit. Drag and drop the code snippets from the bottom onto the blanks in the code to provision a new UCS server. Not all options are used.

Options:

Question 50

Application sometimes store configuration as constants in the code, which is a violation of strict separation of configuration from code. Where should application configuration be stored?

Options:

A.

environment variables

B.

YAML files

C.

Python libraries

D.

Dockerfiles

E.

INI files

Question 51

Refer to the exhibit. The code fetches the latest order from the purchases table for a specific user. An engineer needs to pass query parameters to the execute function to prevent an SQL injection attack. Which code snippet must be placed in the blank in the code to meet this requirement?

A)

B)

C)

D)

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 52

What is a characteristic of event-driven architecture?

Options:

A.

separates the models for the reading and writing of data

B.

allows for loose coupling between software components

C.

breaks a solution into parts according to business capability

D.

provides a single point of reference for mastering data

Question 53

Which Puppet manifest needs to be used to configure an interface GigabitEthernet 0/1 on a Cisco IOS switch?

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 54

Refer to the exhibit.

An application has been developed to serve the users in an enterprise After HTTP cache controls are implemented m the application users report that they receive state data when they refresh the page Without removing HTTP cache controls, which change ensures that the users get current data when refreshing the page'

Options:

A.

Reduce the expire_after value to 60.

B.

Add a Cache-Control header that has a value of no-cache, no-store must-revalidate.

C.

Add an H-None-Match header that has a value of an Entity Tag.

D.

Add an Expires header that has a value of 0.

Page: 1 / 14
Total 363 questions