Best October Special Limited Time 50% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: c4s50disc

350-901 PDF



3 Months Free Update

  • Printable Format
  • Value of Money
  • 100% Pass Assurance
  • Verified Answers
  • Researched by Industry Experts
  • Based on Real Exams Scenarios
  • 100% Real Questions

350-901 PDF + Testing Engine



3 Months Free Update

  • Exam Name: Developing Applications using Cisco Core Platforms and APIs (DEVCOR)
  • Last Update: Oct 14, 2021
  • Questions and Answers: 169
  • Free Real Questions Demo
  • Recommended by Industry Experts
  • Best Economical Package
  • Immediate Access

350-901 Engine



3 Months Free Update

  • Best Testing Engine
  • One Click installation
  • Recommended by Teachers
  • Easy to use
  • 3 Modes of Learning
  • State of Art Technology
  • 100% Real Questions included

350-901 Developing Applications using Cisco Core Platforms and APIs (DEVCOR) Questions and Answers

Question # 4

AppGigabitEthernet interface is used as data port for a container on a Cisco Catalyst 9000 Series Switch. Which two interface configuration options should be used? (Choose two.)

A. trunk interface
B. bridged virtual interface
C. SPAN port
D. management interface
E. subinterface
Full Access
Question # 5

Which two types of storage are supported for app hosting on a Cisco Catalyst 9000 Series Switch? (Choose two.)

A. external USB storage
B. internal SSD
D. SD-card
E. bootflash
Full Access
Question # 6

Refer to the exhibit.

network from Cisco DNA Center

Which configuration of method and parameter retrieves the health of a laptop connected to the network from Cisco DNA Center?

A. PUT; network-health;
B. GET; client-health;
C. GET; network-device;
D. POST; network-device;
Full Access
Question # 7

On a Cisco Catalyst 9300 Series Switch, the guest shell is being used to create a service within a container. Which change is needed to allow the service to have external access?

A. Apply ip nat overload on VirtualPortGroup0.
B. Apply ip nat inside on Interface VirtualPortGroup0.
C. Apply ip nat outside on Interface VirtualPortGroup0.
D. Apply ip nat inside on Interface GigabitEthernet1.
Full Access
Question # 8

Refer to the exhibit.

code snippet is required

Which code snippet is required in the headers to successfully authorize wireless information from Cisco DNA Center?

A. headers = {‘X-auth-token’:’fa8426a0-8eaf-4d22-8e13-7c1b16a9370c’}
B. headers = {‘Authorization’:’Basic YWRtaW46R3JhcGV2aW5IMQ==’}
C. headers = {‘Authorization’:’Bearer ASDNFALKJER23412RKDALSNKF”}
D. headers = {‘Content-type’:’application/json}
Full Access
Question # 9

Into which two areas are AppDynamics APIs categorized? (Choose two.)

A. application-centric
B. analytics-events
C. database-visibility
D. platform-side
E. agent-side
Full Access
Question # 10

Refer to the exhibit.

script uses ciscoyang to configure

This script uses ciscoyang to configure two VRF instances on a Cisco IOS-XR device using the Yang NETCONF type. Which two words are required to complete the script? (Choose two.)

A. ensure
B. commit
C. false
D. replace
E. none
Full Access
Question # 11

There is a requirement to securely store unique usernames and passwords. Given a valid username, it is also required to validate that the password provided is correct. Which action accomplishes this task?

A. Encrypt the username, hash the password, and store these values.
B. Hash the username, hash the password, and store these values.
C. Encrypt the username, encrypt the password, and store these values.
D. Hash the username, encrypt the password, and store these values.
Full Access
Question # 12

While developing an application following the 12-factor app methodology, which approach should be used in the application for logging?

A. Write a log to a file in the application directory.
B. Write a log to a file in /var/log.
C. Write the logs buffered to stdout.
D. Write the logs unbuffered to stdout.
Full Access
Question # 13

An application has initiated an OAuth authorization code grant flow to get access to an API resource on behalf of an end user.
Which two parameters are specified in the HTTP request coming back to the application as the end user grants access? (Choose two.)

A. access token and a refresh token with respective expiration times to access the API resource
B. access token and expiration time to access the API resource
C. redirect URI a panel that shows the list of permissions to grant
D. code that can be exchanged for an access token
E. state can be used for correlation and security checks
Full Access
Question # 14

A web application is susceptible to cross-site scripting. Which two methods allow this issue to be mitigated? (Choose two.)

A. Use only drop downs.
B. Limit user input to acceptable characters.
C. Encrypt user input on the client side.
D. Use AES encryption to secure the script.
E. Remove all HTML/XML tags from user input.
Full Access
Question # 15

A company has extended networking from the data center to the cloud through Transit VPC.

extended networking from the data center

Which two statements describe the benefits of this approach? (Choose two.)

A. Dynamic routing combined with multi-AZ- deployment creates a robust network infrastructure.
B. VPC virtual gateways provide highly available connections to virtual networks.
C. Dedicated VPC simplifies load balancing by combining internal and external web services.
D. VPC virtual gateways provide more secure connections to virtual networks.
E. Dedicated VPC simplifies routing by not combining this service with other shared services.
Full Access
Question # 16

A developer has just completed the configuration of an API that connects sensitive internal systems. Based on company policies, the security of the data is a high priority.
Which approach must be taken to secure API keys and passwords?

A. Embed them directly in the code.
B. Store them in a hidden file.
C. Store them inside the source tree of the application.
D. Change them periodically.
Full Access
Question # 17

Which two principles are included in the codebase tenet of the 12-factor app methodology? (Choose two.)

A. An application is always tracked in a version control system.
B. There are multiple codebases per application.
C. The codebase is the same across all deploys.
D. There can be a many-to-one correlation between codebase and application.
E. It is only possible to have one application deployment per codebase.
Full Access