Summer Special - 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: c4sdisc65

350-901 PDF

$49

$139.99

3 Months Free Update

  • Printable Format
  • Value of Money
  • 100% Pass Assurance
  • Verified Answers
  • Researched by Industry Experts
  • Based on Real Exams Scenarios
  • 100% Real Questions

350-901 PDF + Testing Engine

$66.5

$189.99

3 Months Free Update

  • Exam Name: Developing Applications using Cisco Core Platforms and APIs (DEVCOR)
  • Last Update: Sep 12, 2025
  • Questions and Answers: 434
  • Free Real Questions Demo
  • Recommended by Industry Experts
  • Best Economical Package
  • Immediate Access

350-901 Engine

$56

$159.99

3 Months Free Update

  • Best Testing Engine
  • One Click installation
  • Recommended by Teachers
  • Easy to use
  • 3 Modes of Learning
  • State of Art Technology
  • 100% Real Questions included

350-901 Practice Exam Questions with Answers Developing Applications using Cisco Core Platforms and APIs (DEVCOR) Certification

Question # 6

A custom dashboard of the network health must be created by using Cisco DNA Center APIs An existing dashboard is a RESTful API that receives data from Cisco DNA Center as a new metric every time the network health information is sent from the script to the dashboard Which set of requests creates the custom dashboard?

A.

PUT request to Cisco DNA Center to obtain the network health information and then a POST request to the dashboard to publish the new metric

B.

POST request to Cisco DNA Center to obtain the network health information and then a GET request to the dashboard to publish the new metric

C.

GET request to Cisco DNA Center to obtain the network health information and then a PUT request to the dashboard to publish the new metric

D.

GET request to Cisco DNA Center to obtain the network health information and then a POST request to the dashboard to publish the new metric

Full Access
Question # 7

Drag and drop the code from the bottom onto the box where the code is missing to construct a UCS XML API request to generate two service profiles from the template org-root/is-service-template. Not at options are used

350-901 question answer

Full Access
Question # 8

A developer must create VLANs 2-5 on a remote Cisco NX-OS switch by using an Ansible playbook The playbook must meet these requirements

• Configure the VLANs and a name for each VLAN

• Only run against the switches inventory group

• Execute from the local Ansible controller

• Prevent the collection of system information prior to execution

Which playbook must be used?

A)

350-901 question answer

B)

350-901 question answer

C)

350-901 question answer

D)

350-901 question answer

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 9

An architect must optimize traffic that targets a popular API endpoint Currently, the application downloads a large file hourly, but often the file is unchanged and the download causes unnecessary load and delays Which cURL command must be used to determine the last modified date of the file and to optimize the API usage?

A.

curl GET request

B.

curl HEAD request

C.

curl --silent request

D.

curl -H 'Cache-Control: no-cache' request

Full Access
Question # 10

Which two gRPC modes of model-driven telemetry are supported on Cisco IOS XE Software? (Choose two.)

A.

dial-in

B.

dial-out

C.

call-in

D.

call-out

E.

passive

Full Access
Question # 11

350-901 question answer

350-901 question answer

350-901 question answer

350-901 question answer

350-901 question answer

350-901 question answer

Refer to the exhibit above and click on the resource tabs in the top left corner to view resources to help with this question. Python code using the UCS Python SDK is creating a server pool named “devcore_pool” and populating the pool with all servers from chassis 7 and then the server pool is associated to existing service profile template “devcore_template”. Drag and drop the code snippets from the left onto the item numbers on the right that match the missing sections in the python exhibit.

Refer to the above and click on the resource labs in the top left corner to view resources to help with this question.

Python code using the UCS Python SDK is creating a server pool named "devcore_pool" and populating the pool with all servers from chassis 7, and then the server pool is associated to existing Service Profile template "devcore_template" Drag and drop the code snippets from the left onto the item numbers on the right that match the missing sections in the Python exhibit.

350-901 question answer

Full Access
Question # 12

350-901 question answer

Refer to the exhibit. The presented application consists of a Nginx container and a load balancer service. Which GitLab CI/CD configuration implements the Kubernetes deployment?

350-901 question answer

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 13

Drag and drop the git commands from the left into the correct order on the right to create a feature branch from the master and then incorporate that feature branch into the master.

350-901 question answer

Full Access
Question # 14

Which snippet presents the correct API call to configure, secure, and enable an SSID using the Meraki API?

A)

350-901 question answer

B)

350-901 question answer

C)

350-901 question answer

D)

350-901 question answer

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 15

Which function does Fluentd fulfill for application logging in Kubernetes?

A.

logging agent for distribution

B.

backend time series database storage

C.

monitoring and log visualization

D.

messaging queueig infrastructure

Full Access
Question # 16

A client is written that uses a REST API to interact with a server. Using HTTPS as the transport, an HTTP request is sent and received an HTTP response. The response contains the HTTP response status code: 503 Service Unavailable.

Which action is the appropriate response?

A.

Add an Authorization header that supplies appropriate credentials and sends the updated request.

B.

Resend the request using HTTP as the transport instead of HTTPS.

C.

Add an Accept header that indicates the content types that the client understands and send the updated request.

D.

Look for a Retry-After header in the response and resend the request after the amount of time indicated.

Full Access
Question # 17

Refer to the exhibit.

350-901 question answer

A developer has created a Python script that retrieves information about the deployment of Cisco wireless access points using REST API. Which two code snippets must be added to the blank in the code to print the value of the userid key instead of printing the full JSON response? (Choose two.)

A)

350-901 question answer

B)

350-901 question answer

C)

350-901 question answer

D)

350-901 question answer

E)

350-901 question answer

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 18

Drag and drop the code from the bottom onto the box where the code is missing to construct a contact tracking application that dynamically returns all the Bluetooth clients on a given Meraki network. Not all options are used.

350-901 question answer

Full Access
Question # 19

Drag and drop the code from the bottom onto the where the code is missing to create a host object by using the Cisco Firepower Device Manager API. Not all options are used.

350-901 question answer

Full Access
Question # 20

Refer to the exhibit.

350-901 question answer

Recently, users have reported problems logging into an application with their usernames and passwords. The logs have captured an authentication attempt. Based on the messages and errors contained, what is the cause of the problem?

A.

The sign-in redirection is sending clients to the wrong server for SSO.

B.

There is a time synchronization issue between the application and LDAP.

C.

Users are providing incorrect credentials when logging in.

D.

The LDAP server used for authentication fails to respond to connection requests

Full Access
Question # 21

Refer to the exhibit.

350-901 question answer

350-901 question answer

The Python script is supposed to make an API call to Cisco DNA Center querying a wireless profile for the “ChicagoCampus” and then parsing out its enable FlexConnect value. Drag and drop the parts of the Python code from the left onto the item numbers on the right that match the missing sections in the exhibit.

350-901 question answer

Full Access
Question # 22

Refer to the exhibit.

350-901 question answer

Drag and drop the steps from the left into the order of operation on the right for a successful OAuth2 three-legged authorization code grant flow,

Full Access
Question # 23

Which two methods are API security best practices? (Choose two.)

A.

Use tokens after the identity of a client has been established.

B.

Use the same operating system throughout the infrastructure.

C.

Use encryption and signatures to secure data.

D.

Use basic auth credentials over all internal API interactions.

E.

Use cloud hosting services to manage security configuration.

Full Access
Question # 24

Drag and drop the code from the bottom onto the box whore the code is missing to retrieve a list of rack units that have more than 16 CPU cores. The filtered list will be used to create a summary on the monitoring dashboard. Not all options are used.

350-901 question answer

Full Access
Question # 25

Refer to the exhibit.

350-901 question answer

Which type of python dependency file is shown?

A.

setup.py

B.

TOML

C.

packages

D.

requirements.txt

Full Access
Question # 26

Refer to the exhibit.

350-901 question answer

Which parameter is missing from the JSON response to confirm the API version that is

used?

A.

version 4

B.

v 10

C.

2

D.

version 2

Full Access
Question # 27

A development team is looking for a tool to automate configurations across the infrastructure. The tool must have these characteristics:

•written in Python

•define playbooks (or intent

•stateless

•imperative

Which tool meets these requirements?

A.

Puppet

B.

Netmiko

C.

Ansible

D.

NCM

Full Access
Question # 28

350-901 question answer

Refer to the exhibit. Which URI string retrieves configured static routes in a VRF named CUSTOMER from a RESTCONF-enabled device?

A)

350-901 question answer

B)

350-901 question answer

C)

350-901 question answer

D)

350-901 question answer

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 29

Refer to the exhibit.

350-901 question answer

The cisco_devnet Docker swarm service runs across five replicas The development team tags and imports a new image named devnet'test 1 1 and requests that the image be upgraded on each container There must be no service outages during the upgrade process Which two design approaches must be used? (Choose two.)

A.

Implement rolling upgrades by using the docker service update command.

B.

Enable parallel upgrades by using the docker service update command.

C.

Ensure that the service is hosted behind a VIP with no session persistence.

D.

Update the restart policy of the containers to restart upon failure.

E.

Ensure that the service replicas are set to a minimum of 5

Full Access
Question # 30

Refer to the exhibit.

350-901 question answer

What is the missing step in deploying a Docker container to lOx?

A.

Pull/push the image to the Docker registry,

B.

Build the package.yaml file.

C.

Build the package.cert file to sign the app ,

D.

Log in to Device Manager.

Full Access
Question # 31

A developer has issued git add file1 and file2 test.py command to add the three files for the next commit, but then decides to executed test.py from this command. Which command needs to be used to exclude test.py from this commit but keep the rest of the files?

A.

git clean — test.py

B.

git reset - test py

C.

git checkout - file1 file2

D.

git stash -- file1 file 2

Full Access
Question # 32

How is an OAulh2 three-legged authentication flow initiated?

A.

The user makes a roquost to the OAuth client

B.

Exchange the key f

C.

Construct an API call to retrieve the credentials.

D.

Get the authorization code.

Full Access
Question # 33

Which two data encoding techniques are supported by gRPC? (Choose two.)

A.

XML

B.

JSON

C.

ASCII

D.

ProtoBuf

E.

YAML

Full Access
Question # 34

An automated solution is needed to configure VMs in numerous cloud provider environments to connect the environments to an SDWAN. The SDWAN edge VM is provided as an image in each of the relevant clouds and can be given an identity and all required configuration via cloud-init without needing to log into the VM once online.

Which configuration management and/or automation tooling is needed for this solution?

A.

Ansible

B.

Ansible and Terraform

C.

NSO

D.

Terraform

E.

Ansible and NSO

Full Access
Question # 35

Which statement about microservices architecture is true?

A.

Applications are written in a single unit.

B.

It is a complex application composed of multiple independent parts.

C.

It is often a challenge to scale individual parts.

D.

A single faulty service can bring the whole application down.

Full Access
Question # 36

AppGigabitEthernet interface is used as data port for a container on a Cisco Catalyst 9000 Series Switch. Which two interface configuration options should be used? (Choose two.)

A.

trunk interface

B.

bridged virtual interface

C.

SPAN port

D.

management interface

E.

subinterface

Full Access
Question # 37

A development team is working on a bug fix in a remote branch named "UXbug000222134' and the current working primary branch is named ,prod409024967’ A developer who just joined the learn needs to checkout the remote branch Which Git commands must be used?

A)

350-901 question answer

B)

350-901 question answer

C)

350-901 question answer

D)

350-901 question answer

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 38

Refer to the exhibit

350-901 question answer

350-901 question answer

An application is developed to perform multiple API calls. The calls will be performed on the infrastructure devices Delays in the information transfer occur when the application is executed What are two reasons for the issue? (Choose two )

A.

The list devices API call is failing and does not return a result

B.

Listing devices lakes longer than usual due to high network latency

C.

One of the API calls takes roughly three times as long to complete

D.

The list devices API call is inefficient and should be refactored

E.

The requests are being rate limited to prevent multiple calls causing the excessive load

Full Access
Question # 39

Refer to the exhibit.

350-901 question answer

An application's REST API GET call is tested to the inventory database. Which missing code must be included to limit

the number of values that are returned from the query to 20?

A.

Inventory=20

B.

limit=?2Q

C.

inventory=limit?20

D.

inventory? Iimit20

Full Access
Question # 40

Drag and drop the REST API authentication method from the left to the description on the right

350-901 question answer

Full Access
Question # 41

Drag and drop the code snippets from the bottom onto the boxes where the code is missing to complete the API call to implement error handling Not all options are used.

350-901 question answer

Full Access
Question # 42

A developer has just completed the configuration of an API that connects sensitive internal systems. Based on company policies, the security of the data is a high priority.

Which approach must be taken to secure API keys and passwords?

A.

Embed them directly in the code.

B.

Store them in a hidden file.

C.

Store them inside the source tree of the application.

D.

Change them periodically.

Full Access
Question # 43

A developer is designing a modem, distributed microservice enterprise application. The application will be integrating with other systems and focus on a large deployment, so control of API calls is necessary. What is the best practice to reduce application response latency and protect the application from excessive use?

A.

Implement rate limiting on the client side.

B.

Implement rate limiting on the client and server sides.

C.

Do not enforce any rate Imiting

D.

Implement rate limiting on the server side.

Full Access
Question # 44

Refer to the exhibit.

350-901 question answer

A kubeconfig file to manage access to clusters is provided. How many clusters are defined and which of them are accessed using username/password authentication versus certificate?

A.

two clusters; scratch

B.

three clusters; scratch

C.

three clusters; development

D.

two clusters; development

Full Access
Question # 45

Refer to the exhibit.

350-901 question answer

This script uses ciscoyang to configure two VRF instances on a Cisco IOS-XR device using the Yang NETCONF type.

Which two words are required to complete the script? (Choose two.)

A.

ensure

B.

commit

C.

false

D.

replace

E.

none

Full Access
Question # 46

Refer to the exhibit.

350-901 question answer

The application follows a containerized microservices architecture that has one container per microservice. The microservices communicate with each other by using REST APIs The double-headed arrows m the diagram display chains of synchronous HTTP calls needed for a single use/request Which action ensures the resilience of the application in the scope of a single user request?

A.

Redesign the application to be separated into these three layers Presentation. API. and Data

B.

Implement retries with exponential backoff during HTTP API calls

C.

Set up multiple instances of each microservice m active/active mode by using the Orchestrator

D.

Create two virtual machines that each host an instance of the application and set up a cluster

Full Access
Question # 47

When end-to-end encryption is implemented, which area is most vulnerable to exploitation?

A.

cryptographic key exchange

B.

endpoint security

C.

cryptographic key generation

D.

security of data in transit

Full Access
Question # 48

350-901 question answer

Refer to the exhibit Drag and drop the code snippets from the left onto the item numbers on the right that match the missing sections in the exhibit to complete the script to implement control flow.

350-901 question answer

Full Access
Question # 49

Refer to the exhibit.

350-901 question answer

Which action should be performed to avoid an SQL injection attack?

A.

Encrypt the password that is used to connect to the database

B.

Develop a denial of service response plan

C.

Vacate the input on the platform variable

D.

Compile the Python file instead of allowing live interpretation

Full Access
Question # 50

Drag and drop the code onto the snippet to update a SSID in Meraki using the Dashboard API. Not all options are used.

350-901 question answer

Full Access
Question # 51

Refer to the exhibit.

350-901 question answer

A Docker swarm cluster is configured to load balance services across data centers in three different geographical regions west central and east. The cluster has three manager nodes and three worker nodes Anew service named cisco.devnet is being deployed. The service has these design requirements

• All containers must be hosted only on nodes in the central region

• The service must run only on nodes that are ineligible for the manager role

Which approach fulfills the requirements?

A.

Create a second swarm cluster that is hosted only in the central region.

B.

Create the service manually in the central region and set replicas to 0.

C.

Use placement constraints to control nodes to which the service can be assigned.

D.

Enable the control flag in the containers of the west and east regions to prevent the service from starting

Full Access
Question # 52

A developer must deploy a containerized application for network device inventory management. The developer sets up a Kubernetes cluster on two separate hypervisors The SLA is not currently meeting a specified maximum value for network latency/jitter. CPU/memory and disk 1,0 are functioning property.

Which two design approaches resolve the issue? (Choose two.)

A.

Upgrade the server NIC card.

B.

Colocate services in the same pod.

C.

Enable IPv6 within the cluster

D.

Replace the HDD drives with SSD drives.

E.

Deploy the cluster to a bare metal server.

Full Access
Question # 53

Which scenario is an example of the pseudonymization of sensitive data that meets GDPR requirements?

A.

encrypting sensitive data at rest by using native cloud services and data in transit by using SSL/TLS transport

B.

implementing XFowarded For at the frontend of a web app to enable the source IP addresses of headers to change

C.

leveraging an application load balancer at the frontend of a web app for SSL/TLS decryption to inspect data in transit

D.

separating the sensitive data into its own dedicated secured data store and using tokens in its place

Full Access
Question # 54

Refer to the exhibit.

350-901 question answer

An Intersight API is being used to query RackUnit resources that have a tag keyword set to “Site”. What is the expected output of this command?

A.

list of all resources that have a tag with the keyword “Site”

B.

error message because the Value field was not specified

C.

error message because the tag filter should be lowercase

D.

list of all sites that contain RackUnit tagged compute resources

Full Access
Question # 55

Drag and drop the operations from the left into the order on the right to create a web dashboard that displays Cisco DNA Center data for an organization.

350-901 question answer

Full Access
Question # 56

What securely stores and encrypts the API keys and tokens that are used for an application deployment?

A.

ITSM

B.

Artifactory

C.

GitHub

D.

Vault

Full Access
Question # 57

What is a benefit of running multiple instances of a back-end service and using load balancing to distribute the communication between the front-end and back-end services?

A.

The consistency of data for stateful services increases.

B.

High availability is provided for the back-end services.

C.

Scaling horizontally is automated out of the box.

D.

The total load on the database servers decreases.

Full Access
Question # 58

An organization manages a large cloud-deployed application that employs a microservices architecture across multiple data centers. Reports have received about application slowness. The container orchestration logs show that faults have been raised in a variety of containers that caused them to fail and then spin up brand new instances.

Which two actions can improve the design of the application to identify the faults? (Choose two.)

A.

Automatically pull out the container that fails the most over a time period.

B.

Implement a tagging methodology that follows the application execution from service to service.

C.

Add logging on exception and provide immediate notification.

D.

Do a write to the datastore every time there is an application failure.

E.

Implement an SNMP logging system with alerts in case a network link is slow.

Full Access
Question # 59

What is an effective logging strategy according 10 the 12-factor app tenets?

A.

Capture togs by the execution environment and route to a centralized destination

B.

Tag and save togs in a local document database that has querying capabilities.

C.

Back up log files in a high-availability remote cluster on the public cloud

D.

Timestamp and save logs in a local time-series database that has querying capabilities

Full Access
Question # 60

Refer to the exhibit.

350-901 question answer

An attempt to execute a CI/CD pipeline results m the error shown What is the cause of the error?

A.

The VCS repository is unavailable

B.

The unit tests failed to complete

C.

The built artifacts failed to publish to the target server

D.

The remote library repository is unavailable

Full Access
Question # 61

How should a web application be designed to work on a platform where up to 1000 requests per second can be served?

A.

Use algorithms like random early detection to deny excessive requests.

B.

Set a per-user limit (for example, 5 requests/minute/user) and deny the requests from the users who have reached the limit.

C.

Only 1000 user connections are allowed; further connections are denied so that all connected users can be served.

D.

All requests are saved and processed one by one so that all users can be served eventually.

Full Access
Question # 62

Refer of the exhibit.

Click on the resource labs in the top left corner to view resources to help with this question The script uses the Cisco Intersight REST API Drag and drop the code from the bottom of the code snippet to the blanks in the code to construct a Python script to update the firmware on a specific Cisco interaght managed UCS rack server, DMZ-RL3ADJM.

350-901 question answer

Full Access
Question # 63

What are two benefits of using distributed log collectors? (Choose two.)

A.

supports multiple transport protocols such as TCP/UDP

B.

improves performance and reduces resource consumption

C.

provides flexibility due to a wide range of plugins and accepted log formats

D.

enables extension of logs with fields and export to backend systems

E.

buffers and resends data when the network is unavailable

Full Access
Question # 64

Which type of file is created from issued intermediate, root, and primary certificates for SSL installation on a server?

A.

DER

B.

CSR

C.

PEM

D.

CRT

Full Access
Question # 65

Refer to the exhibit.

350-901 question answer

Which additional line results in the output of Test 1 upon execution of the docker run --rm devnet 1 command in a Dockerfile with this content?

A.

CMD [“/bin/echo”, “Test”]

B.

RUN [“/bin/echo”, “Test”]

C.

ENTRYPOINT [“/bin/echo”, “Test”]

D.

CMD [“/bin/echo Test”]

Full Access
Question # 66

350-901 question answer

350-901 question answer

Refer to the exhibits. An interface named “GigabitEthernet2” has been configured on a Cisco IOS XE device. Using RESTCONF APIs as defined by the ietf-interfaces@2014-05-08.yang model, which two combinations of “rest_operation” and “payload” must be added to the Python script to set the “description” to “Configured by RESTCONF”? (Choose two.)

350-901 question answer

350-901 question answer

A.

Option A

B.

Option B

C.

Option C

D.

Option D

E.

Option E

Full Access
Question # 67

How does the use of release packaging allow dependencies to be effectively managed during deployments?

A.

dependencies are staggered between multiple releases

B.

designed to prevent any dependencies between release units

C.

dependencies are tested after the release is deployed

D.

removal of release units if they have issues in testing

Full Access
Question # 68

Which database type should be used with highly structured data and provides support for ACID transactions?

A.

time series

B.

document

C.

graph

D.

relational

Full Access
Question # 69

Which HTTP status code indicates that a client application is experiencing intentional rate limiting by the server?

A.

202

B.

401

C.

429

D.

503

Full Access
Question # 70

Refer to the exhibit.

350-901 question answer

Drag and drop the code from the bottom onto the box where the code is missing to construct a Python script that prints a message if the Cisco DNA Center wireless network health for a site is not greater than 90%. The information is collected from the wireless network devices using GET method of REST API. Not all options are used.

350-901 question answer

Full Access
Question # 71

Which two techniques protect against injection attacks? (Choose two.)

A.

input validation

B.

trim whitespace

C.

limit text areas to 255 characters

D.

string escaping of user free text and data entry

E.

only use dropdown, checkbox, and radio button fields

Full Access
Question # 72

DRAG DROP

350-901 question answer

350-901 question answer

Refer to the exhibit. A system administrator has installed a Linux-based alarm system in their home that can execute a Bash shell script when an intruder is detected. Drag and drop the code snippets from the left onto the item numbers on the right that match the missing sections in the exhibit to create a chat-ops script that will notify of alarms via the Webex Teams REST API. Not all code snippets are used.

350-901 question answer

Full Access
Question # 73

A bot has been created, called "386231131”, to respond to alarm messages. A developer is now creating a Webhook to allow the bot to respond to messages. Which format allows the Webhook to respond to messages for the bot within Webex Teams?

A)

350-901 question answer

B)

350-901 question answer

C)

350-901 question answer

D)

350-901 question answer

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 74

Drag and drop the code from the bottom onto the box where the code is missing to configure a router that runs Cisco IOS XE by using RESTCONF. The API call is made to the management URL of the IOS XE device and on a registered port number. Errors that are caught during HTTP operation are registered. Not all options are used.

350-901 question answer

Full Access
Question # 75

Which transport protocol is used by gNMI?

A.

HTTP/2

B.

HTTP 1.1

C.

SSH

D.

MQTT

Full Access
Question # 76

An application is hosted on Google Kubernetes Engine. A new JavaScript module is created to work with the existing application. Which task is mandatory to make the code ready to deploy?

A.

Create a Dockerfile for the code base.

B.

Rewrite the code in Python.

C.

Build a wrapper for the code to “containerize” it.

D.

Rebase the code from the upstream git repo.

Full Access
Question # 77

Refer to the exhibit.

350-901 question answer

Two editors are concurrently updating an article’s headline from their mobile devices. What results from this scenario based on this REST API sequence?

A.

The article is marked as “Conflicted”

B.

The article headline is “Monday Headlines”

C.

The article headline is “Today Headlines”

D.

The article headline is “Top Headlines”

Full Access
Question # 78

Refer to the exhibit.

350-901 question answer

Which action will complete the workflow that represents how an API call sends multiple messages?

A.

{PUT} messages(roomID)

B.

{PUT} messages(BearerToken)

C.

{POST} messages(roomID)

D.

{POST} messages(BearerToken)

Full Access
Question # 79

A network engineer needs to retrieve interface data using the Cisco IOS XE YANG Model. Drag and drop the

components from the bottom onto the box where the code is missing to complete the RESTCONF URI. Not all

options are used.

350-901 question answer

Full Access
Question # 80

Drag and drop the steps from the left into the order on the right to build and run a customized Python DocKer image. Not all options are used

350-901 question answer

Full Access
Question # 81

Drag and drop the code from the bottom onto the box where the code is missing to enable an SSID by using the Cisco Meraki Dashboard API. Not all options are used.

350-901 question answer

Full Access
Question # 82

A web application has those requirements for HTTP cache control:

  • The client browser must be prevented from storing responses that contain sensitive information.
  • Assets must be downloaded from the remote server every time.

Which header must the engineer use?

A.

must-revabdate

B.

no-store

C.

public

D.

private

Full Access
Question # 83

What is the function of dependency management?

A.

separating code into modules that execute independently

B.

utilizing a single programming language/framework for each code project

C.

automating the identification and resolution of code dependencies

D.

managing and enforcing unique software version names or numbers

Full Access
Question # 84

A developer is working in a branch to develop a new feature named ‘newfeat404880077’. A file named ‘devcoreg13642911.jpg’ has accidentally been staged. This needs to be removed so that the commit is performed and branches merged. Which git command must be used to unstage the file?

A.

git delete HEAD devcoreg13642911.jpg

B.

git remove HEAD devcoreg13642911.jpg

C.

git reset HEAD devcoreg13642911.jpg

D.

git revert HEAD devcoreg13642911.jpg

Full Access
Question # 85

Refer to the exhibit.

350-901 question answer

A developer must configure an SSL certificate for an nginx web server Which code must be added on the script to accomplish this configuration?

A)

350-901 question answer

B)

350-901 question answer

C)

350-901 question answer

D)

350-901 question answer

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 86

Refer to the exhibit.

350-901 question answer

Cisco IOS XE switches are used across the entire network and the description that is filed for all interfaces must be configured. Which code snippet must be placed in the blank in the script to leverage RESTCONF to query all the devices in the device list for the interfaces that are present?

A)

350-901 question answer

B)

350-901 question answer

C)

350-901 question answer

D)

350-901 question answer

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 87

Why is end-to-end encryption deployed when exposing sensitive data through APIs?

A.

Traffic is encrypted and decrypted at every hop in the network path.

B.

Data transfers are untraceable from source to destination.

C.

Data cannot be read or modified other than by the true source and destination.

D.

Server-side encryption enables the destination to control data protection.

Full Access
Question # 88

Refer to the exhibit.

350-901 question answer

An engineer needs to change the IP address via RESTCOMF on interface GigabitEthernet2. An error message is received when the script is run. Which amendment to the code will result in a successful RESTCONF action?

A.

Change POST to PATCH.

B.

Issue a DELETE before POST.

C.

Issue a DELETE before PATCH

D.

Change POST to GET

Full Access
Question # 89

Users report that they are no longer able to process transactions with the online ordering application, and the logging dashboard is

displaying these messages:

Fri Jan 10 19:37:31.123 ESI 2020 [FRONTEND] [NFO: Incoming request to add item to cart from user 45834534858

Fri Jan 10 19:37:31.247 EST 2020 [BACKEND] INFO: Attempting to add item to cart

Fri Jan 10 19:37:31.250 EST 2020 [BACKEND] ERROR: Failed to add item: MYSQLDB ERROR: Connection refused

What is causing the problem seen in these log messages?

A.

The database server container has crashed.

B.

The backend process is overwhelmed with too many transactions.

C.

The backend is not authorized to commit to the database.

D.

The user is not authorized to add the item to their cart.

Full Access
Question # 90

A developer in a learn of distributed authors is working on code in an isolated Git branch named 'update4a2f5464771 The developer attempts to merge the new code with a branch named ’dvcapp2a3f1564733' however the merge operation encounters a conflict error during the process. Which Git command must the developer use to exit from the merge process and return the branch to the previous state?

A.

git merge -exit

B.

git merge -abort

C.

git abort —merge

D.

git abort -status

Full Access
Question # 91

350-901 question answer

350-901 question answer

350-901 question answer

Refer to the exhibit above and click on the resource tabs in the top left corner to view resources to help with this question. Drag and drop the correct code snippets from the left onto the item numbers on the right that match the missing sections in the exhibit to complete the cURL script that will use RESTCONF to update an interface on a CISCO IOS XE device.

350-901 question answer

Full Access
Question # 92

Refer to the exhibit Pipenv is used to manage dependencies The test funs successfully on a local environment. What is the reason for the error when running the test on a CI'CD pipeline?

A.

The piple in the local environment was not pushed to the remote repository

B.

All the unit tests in testsum py failed

C.

Pytest did not detect any functions that start with test_'.

D.

Nose2 was not used as the test runner

Full Access
Question # 93

Refer to the exhibit , The command docker build -tag=friendlyhello . is run to build a docker image from the given Dockerfile,

requirements,txt, and app.py, Then the command docker run -p 4000:80 friendlyhello is executed to run the application. Which URL is entered in the web browser to see the content served by the application?

A.

http://localhost:4000

B.

http ://localhost:80

C.

http ://127.0.0.1:80

D.

http:///4000:80

Full Access
Question # 94

Refer to the exhibit.

350-901 question answer

As part of the Ansible playbook workflow, several new interfaces are being configured using the netconf_config module. The task references the interface variables that are unique per device.

In which directory is the YAML file with these variables found?

A.

host_vars directory

B.

home directory

C.

group_vars directory

D.

current working directory

Full Access
Question # 95

Refer to the exhibit.

350-901 question answer

Many faults have occurred in the ACI environment and a sample of them needs to be examined. Which API call retrieves faults 30 through 45?

A.

GET https://apic-ip-address/api/class/faultInfo.json?order-by=faultinst.severity|desc &page=1&page- size=15

B.

GET https://apic-ip-address/api/class/faultInfo.json?order-by=faultinst.severity|desc &page=2&page- size=15

C.

GET https://apic-ip-address/api/class/faultInfo.json?order-by=faultinst.severity|desc &page=30

D.

GET https://apic-ip-address/api/class/faultInfo.json?order-by=faultinst.severity|desc &page=2&page- size=30

Full Access
Question # 96

350-901 question answer

350-901 question answer

Click on the GET Resource button above to view resources that will help with this question. An engineer is managing a DC with 6000 Cisco UCS servers installed and running. The engineer has been asked to identify all resources where the model is in the UCSB family and the available memory is less than or equal to 5 GB. Which REST API call accomplishes this task?

A.

GET/api/v1/compute/RackUnits?$select=Vendor,Model,Serial&$filter=not(Model eq ‘UCSC’) and AvailableMemory le 5000

B.

GET/api/v1/compute/RackUnits?$select=Vendor,Model,Serial&$filter=Model eq ‘UCSB’ and AvailableMemory lt 5000

C.

GET/api/v1/compute/RackUnits?$select=Vendor,Model,Serial&$filter=contains(Model, UCSB’) and AvailableMemory lt 5000

D.

GET/api/v1/compute/RackUnits?$select=Vendor,Model,Serial&$filter=contains(Model, UCSB’) and AvailableMemory le 5000

Full Access
Question # 97

A developer is working on an enhancement for an application feature and has made changes to a branch called ‘devcor-432436127a-enhance4‘. When merging the branch to production, conflicts occurred. Which Git command must the developer use to recreate the pre-merge state?

A.

git merge -no-edit

B.

git merge -abort

C.

git merge -revert

D.

git merge —comrmt

Full Access
Question # 98

Which two strategies are used to protect personally identifiable information? (Choose two.)

A.

Encrypt data in transit.

B.

Encrypt hash values of data.

C.

Encrypt data at rest.

D.

Only hash usernames and passwords for efficient lookup.

E.

Only encrypt usernames and passwords for efficient lookup.

Full Access
Question # 99

350-901 question answer

350-901 question answer

350-901 question answer

Refer to the exhibit above and click on the resource tabs in the top left corner to view resources to help with this question. Python code that uses the UCS Python SDK is instantiating a service profile named ''devcore-server-01'' from service profile template ''device-template'' , then associating the service profile instance to blade 3 in chassis 7. Drag and drop the code snippets from the left onto the item numbers on the right that match the missing sections in the Python exhibit.

350-901 question answer

Full Access
Question # 100

Refer to the exhibit.

350-901 question answer

Which set of API requests must be executed by a Webex Teams bot after receiving a webhook callback to process messages in a room and reply with a new message back to the same room?

350-901 question answer

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 101

Which OAuth mechanism enables clients to continue to have an active access token without further interaction from the user?

A.

JWT

B.

password grant

C.

refresh grant

D.

preshared key

Full Access
Question # 102

Drag and drop the code from the bottom onto the box where the code is missing in the Ansible script to get the existing firewall rules from Cisco Meraki and store the results to a new variable. Not all options are used.

350-901 question answer

Full Access
Question # 103

Which two actions must be taken when an observable microservice application is developed? (Choose two.)

A.

Know the state of a single instance of a single service.

B.

Place “try/except” statement in code.

C.

Place log statements in the code.

D.

Use distributed tracing techniques.

E.

Deploy microservice to multiple datacenters.

Full Access
Question # 104

Refer to the exhibit.

350-901 question answer

An engineer needs to implement REST API error handling when a timeout or rate limit scenario is present. Which code snippet must be placed into the blank in the code to complete the API request?

A)

350-901 question answer

B)

350-901 question answer

C)

350-901 question answer

D)

350-901 question answer

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 105

Refer to the exhibit.

350-901 question answer

What is the output of this IOS-XE configuration program?

A.

interface operational status in IPv6 addresses

B.

interface administrative status in IPv4 addresses

C.

interface operational status in IPv4 addresses

D.

interface administrative status in IPv6 addresses

Full Access
Question # 106

Which command is used 10 enable application hosting on a Cisco IOS XE device?

A.

iox

B.

iox-service

C.

application -honing

D.

app- hosting

Full Access
Question # 107

An enterprise refactors its monolithic application into a modem cloud-native application that is based on microservices. A key requirement of the application design is to ensure that the IT team is aware of performance issues or bottlenecks in the new application Which two approaches must be part of the design considerations'' (Choose two.)

A.

Periodically scale up the resources of the host machines when the application starts to experience high loads

B.

Instrument the application code to gather telemetry data from logs, metrics or tracing

C.

Adopt a service-oriented architecture to handle communication between the services that make up the application

D.

Deploy infrastructure monitoring agents into the operating system of the host machines

E.

Implement infrastructure monitoring to ensure that pipeline components interoperate smoothly and reliably

Full Access
Question # 108

Application sometimes store configuration as constants in the code, which is a violation of strict separation of configuration from code. Where should application configuration be stored?

A.

environment variables

B.

YAML files

C.

Python libraries

D.

Dockerfiles

E.

INI files

Full Access