March Special Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

350-901 Exam Dumps - Developing Applications using Cisco Core Platforms and APIs (DEVCOR)

Question # 4

Users report that they are no longer able to process transactions with the online ordering application, and the logging dashboard is

displaying these messages:

Fri Jan 10 19:37:31.123 ESI 2020 [FRONTEND] [NFO: Incoming request to add item to cart from user 45834534858

Fri Jan 10 19:37:31.247 EST 2020 [BACKEND] INFO: Attempting to add item to cart

Fri Jan 10 19:37:31.250 EST 2020 [BACKEND] ERROR: Failed to add item: MYSQLDB ERROR: Connection refused

What is causing the problem seen in these log messages?

A.

The database server container has crashed.

B.

The backend process is overwhelmed with too many transactions.

C.

The backend is not authorized to commit to the database.

D.

The user is not authorized to add the item to their cart.

Full Access
Question # 5

Click on the GET Resource button above to view resources that will help with this question.

An engineer is managing a DC with 6000 Cisco UCS servers installed and running. The engineer has been asked to identify all resources where the model is in the UCSB family and the available memory is less than or equal to 5 GB.

Which REST API call accomplishes this task?

A.

GET/api/v1/compute/RackUnits?$select=Vendor,Model,Serial&$filter=not(Model eq ‘UCSC’) and AvailableMemory le 5000

B.

GET/api/v1/compute/RackUnits?$select=Vendor,Model,Serial&$filter=Model eq ‘UCSB’ and AvailableMemory lt 5000

C.

GET/api/v1/compute/RackUnits?$select=Vendor,Model,Serial&$filter=contains(Model, UCSB’) and AvailableMemory lt 5000

D.

GET/api/v1/compute/RackUnits?$select=Vendor,Model,Serial&$filter=contains(Model, UCSB’) and AvailableMemory le 5000

Full Access
Question # 6

Refer to the exhibit.

An application is created to serve an enterprise Based on use and department requirements, changes are requested quarterly Which application design change improves code maintainability?

A.

Use global variables

B.

Use double quotes instead of single quotes to enclose variables

C.

Use different indent levels for variables

D.

Use more verbose names for variables

Full Access
Question # 7

What is a consideration for using gRPC as the model-driven telemetry protocol on a Cisco IOS XE device?

A.

XML-based transmission format

B.

works in dial-out mode

C.

human-readable transmission format

D.

works in call-out mode

Full Access
Question # 8

What is a benefit of using model-driven telemetry?

A.

enables operational data to be collected at higher rates and a higher scale

B.

enables the application to pull data faster than pushing the data

C.

reduces the load on the server by enabling the client to pull data

D.

simplifies the development of clients by using a single encoding standard for the data

Full Access
Question # 9

Refer to the exhibit.

An engineer needs to implement REST API error handling when a timeout or rate limit scenario is present. Which code snippet must be placed into the blank in the code to complete the API request?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 10

A web application is being developed to provide online sales to a retailer. The customers will need to use their username and passwords to login into then profile and complete their order For this reason the application must store user passwords Which approach ensures that an attacker wifi need to crack the passwords one at a time?

A.

Apply the peppering technique

B.

Store the passwords by using asymmetric encryption

C.

Apply the salting technique

D.

Store the passwords by using symmetric encryption

Full Access
Question # 11

Drag and drop the code from the bottom onto the box where the code is missing in the diagram to show how data is processed in Webex Teams. Not all options are used.

Full Access
Question # 12

Drag and drop the code from the bottom onto the where the code is missing to create a host object by using the Cisco Firepower Device Manager API. Not all options are used.

Full Access
Question # 13

Refer to the exhibit.

Refer to the exhibit A Docker swarm service is currently running m a local data center The service is hosting an HTML website it the container fads then the service becomes unavailable The design must meet these requirements

• The service must be highly available and resilient against a data center outage.

• The service must be accessible from a single URL

• The HTTP session must remain on the server from which the original request was sent

• Failure of the server must force the client to reconnect

Which two design approaches must be used to meet the requirements? (Choose two.)

A.

Create another swarm cluster within a data center and deploy a secondary instance of the service.

B.

Create another node in the swarm duster to scale the service across the nodes over two replicas.

C.

Configure an external load balancer to route requests to the swarm service by using session persistence

D.

Scale the Docker swarm service to 2 and set endpoint-mode to DNSRR instead of the default value of VIP

E.

Configure a routing mesh to route requests to the swarm service by using NAT on the network side

Full Access
Question # 14

A Python script must query the Cisco DNA center API for the number of unique wireless clients that are exhibiting poor health behavior. Drag and drop the code from the bottom onto the box where the code is missing to complete the script Not all options are used.

Full Access
Question # 15

What is an effective logging strategy according 10 the 12-factor app tenets?

A.

Capture togs by the execution environment and route to a centralized destination

B.

Tag and save togs in a local document database that has querying capabilities.

C.

Back up log files in a high-availability remote cluster on the public cloud

D.

Timestamp and save logs in a local time-series database that has querying capabilities

Full Access
Question # 16

Refer to the exhibit. The presented application consists of a Nginx container and a load balancer service. Which GitLab CI/CD configuration implements the Kubernetes deployment?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 17

Drag and drop the code from the bottom onto the box where the code is missing to delete a host object by using the Cisco Firepower Device Manager API Not all options are used.

Full Access
Question # 18

Which two techniques protect against injection attacks? (Choose two.)

A.

input validation

B.

trim whitespace

C.

limit text areas to 255 characters

D.

string escaping of user free text and data entry

E.

only use dropdown, checkbox, and radio button fields

Full Access
Question # 19

Refer to the exhibit.

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 20

Refer to the exhibit above and click on the resource tabs in the top left corner to view resources to help with this question. Drag and drop the correct code snippets from the left onto the item numbers on the right that match the missing sections in the exhibit to complete the cURL script that will use RESTCONF to update an interface on a CISCO IOS XE device.

Full Access
Question # 21

Which two principles are included in the codebase tenet of the 12-factor app methodology? (Choose two.)

A.

An application is always tracked in a version control system.

B.

There are multiple codebases per application.

C.

The codebase is the same across all deploys.

D.

There can be a many-to-one correlation between codebase and application.

E.

It is only possible to have one application deployment per codebase.

Full Access
Question # 22

Where mus! the data be encrypted to ensure end-to-end encryption when using an API?

A.

on the device that consumes the API

B.

on the source device before transmission

C.

on the end device after a request is received

D.

on the server that stores the data

Full Access
Question # 23

Refer to the exhibit.

This snippet of a script has recently started exiting abnormally with an exception stating “Unexpected HTTP Response code: 429”.

Which solution handles rate limiting by the remote API?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 24

A developer is working on a live project and must apply a new feature. After the commit,the manager informs the team that the wrong file was applied. The developer must undo the single commit and apply the file with the name feature-App-UXU1411841916ADD. Which command must the developer use?

A.

git revert

B.

git checkout

C.

git clean

D.

git reset

Full Access
Question # 25

A cloud native project is being worked on in which all source code and dependencies are written in Python, Ruby, and/or JavaScipt. A change in code triggers a notification to the CI/CD tool to run the CI/CD pipeline.

Which step should be omitted from the pipeline?

A.

Deploy the code to one or more environments, such as staging and/or production.

B.

Build one of more containers that package up code and all its dependencies.

C.

Compile code.

D.

Run automated tests to validate the correctness.

Full Access
Question # 26

A developer plans to create a new bugfix branch to fix a bug that was found on the release branch. Which command completes the task?

A.

git checkout -b RELEASE BUGFIX

B.

git checkout -t BUGF1X RELEASE

C.

git checkout -b BUG FIX RELEASE

D.

git checkout -t RELEASE BUGFIX

Full Access
Question # 27

What is a benefit of implementing a Cl pipeline?

A.

enforces version control

B.

enables a faster feedback loop

C.

ensures that tests are written before code is written

D.

decreases external dependencies

Full Access
Question # 28

Refer to the exhibit.

A company has extended networking from the data center to the cloud through Transit VPC.

Which two statements describe the benefits of this approach? (Choose two.)

A.

Dynamic routing combined with multi-AZ- deployment creates a robust network infrastructure.

B.

VPC virtual gateways provide highly available connections to virtual networks.

C.

Dedicated VPC simplifies load balancing by combining internal and external web services.

D.

VPC virtual gateways provide more secure connections to virtual networks.

E.

Dedicated VPC simplifies routing by not combining this service with other shared services.

Full Access
Question # 29

While working with the Webex Teams API, on an application that uses end-to-end encryption, a webhook has

been received. What must be considered to read the message?

A.

Webhook information cannot be used to read the message because of end-to-end encryption. The API key

is needed to decrypt the message.

B.

Webhook returns the full unencrypted message. Only the body is needed to query the API.

C.

Webhook returns a hashed version of the message that must be unhashed with the API key.

D.

Webhook returns message identification. To query, the API is needed for that message to get the decrypted

information.

Full Access
Question # 30

Which two countermeasures help reduce the risk of playback attacks? (Choose two.)

A.

Store data in a NoSQL database.

B.

Implement message authentication (HMAC).

C.

Enable end-to-end encryption.

D.

Remove stack traces from errors.

E.

Use short-lived access tokens.

Full Access
Question # 31

A local Docker image has an image ID of 386231131. Fill in the blanks to complete the command in order to tag the image into the "cisco" repository with "version1 0’".

Full Access
Question # 32

Refer to the exhibits. An interface named “GigabitEthernet2” has been configured on a Cisco IOS XE device. Using RESTCONF APIs as defined by the ietf-interfaces@2014-05-08.yang model, which two combinations of “rest_operation” and “payload” must be added to the Python script to set the “description” to “Configured by RESTCONF”? (Choose two.)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

E.

Option E

Full Access
Question # 33

Refer to the exhibit.

The cisco_devnet Docker swarm service runs across five replicas The development team tags and imports a new image named devnet'test 1 1 and requests that the image be upgraded on each container There must be no service outages during the upgrade process Which two design approaches must be used? (Choose two.)

A.

Implement rolling upgrades by using the docker service update command.

B.

Enable parallel upgrades by using the docker service update command.

C.

Ensure that the service is hosted behind a VIP with no session persistence.

D.

Update the restart policy of the containers to restart upon failure.

E.

Ensure that the service replicas are set to a minimum of 5

Full Access
Question # 34

A developer is deploying an application to automate the configuration and management of Osco network files and routers The application must use REST API interface lo achieve programmability. The security team mandates that the network must be protected against DDoS attacks What mitigates the attacks without impacting genuine requests?

A.

API rate limiting at the application layer

B.

IP address filtering at the application layer

C.

traffic routing on the network perimeter

D.

firewall on the network perimeter

Full Access
Question # 35

Drag and drop the code from the bottom onto the box where the code is missing to create a new IKEv2 policy Not all options are used

Full Access
Question # 36

Refer to the exhibit.

An application is created to serve the needs of an enterprise. Slow performance now impacts certain API calls, and the application design lacks observability. Which two commands improve observability and provide an output that is similar to the sample output? (Choose two.)

A)

B)

C)

D)

E)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

E.

Option E

Full Access
Question # 37

Refer to the exhibit. Which URI string retrieves configured static routes in a VRF named CUSTOMER from a RESTCONF-enabled device?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 38

When end-to-end encryption is implemented, which area is most vulnerable to exploitation?

A.

cryptographic key exchange

B.

endpoint security

C.

cryptographic key generation

D.

security of data in transit

Full Access
Question # 39

A Cisco Catalyst 9000 switch has guest shell enabled. Which Linux command installs a third-party application?

A.

yum Install

B.

apt-get install

C.

zypper install

D.

dnf install

Full Access
Question # 40

Where should distributed load balancing occur in a horizontally scalable architecture?

A.

firewall-side/policy load balancing

B.

network-side/central load balancing

C.

service-side/remote load balancing

D.

client-side/local load balancing

Full Access
Question # 41

Refer to the exhibit.

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 42

Refer to the exhibit Pipenv is used to manage dependencies The test funs successfully on a local environment. What is the reason for the error when running the test on a CI'CD pipeline?

A.

The piple in the local environment was not pushed to the remote repository

B.

All the unit tests in testsum py failed

C.

Pytest did not detect any functions that start with test_'.

D.

Nose2 was not used as the test runner

Full Access
Question # 43

What is submitted when an SSL certificate is requested?

A.

PEM

B.

CRT

C.

DER

D.

CSR

Full Access
Question # 44

Refer to the exhibit. Which snippet creates a Webex Teams space and adds the users in the variable user list to that space?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 45

How does the use of release packaging allow dependencies to be effectively managed during deployments?

A.

dependencies are staggered between multiple releases

B.

designed to prevent any dependencies between release units

C.

dependencies are tested after the release is deployed

D.

removal of release units if they have issues in testing

Full Access
Question # 46

A development team is looking for a tool to automate configurations across the infrastructure. The tool must have these characteristics:

•written in Python

•define playbooks (or intent

•stateless

•imperative

Which tool meets these requirements?

A.

Puppet

B.

Netmiko

C.

Ansible

D.

NCM

Full Access
Question # 47

A developer must containerize a Python application to integrate into a prebuilt CD environment by creating a Docker image. It will be hosted as a web application to enable end users from accessing it remotely. Drag and drop the code from the bottom onto the box where the code is missing in the Docker file Not all options are used.

Full Access
Question # 48

A developer is creating a Python script to use the Webex Teams REST API to list joined spaces, and gracefully handle and print the errors it receives. Drag and drop the code snippets from the left onto the item numbers on the right that match the missing sections in the exhibit to complete the script.

Full Access
Question # 49

Drag and drop the steps from the left into the correct sequence on the right to describe how to use Git to maintain the current HEAD and revert back to a previous commit, while undoing all intermediate commits.

Full Access
Question # 50

Refer to the exhibit.

Drag and drop the parts of the Python code from the left onto the item numbers on the right that match the missing sections in the exhibit that consumes REST API pagination.

Full Access
Question # 51

There is a requirement to securely store unique usernames and passwords. Given a valid username, it is also required to validate that the password provided is correct. Which action accomplishes this task?

A.

Encrypt the username, hash the password, and store these values.

B.

Hash the username, hash the password, and store these values.

C.

Encrypt the username, encrypt the password, and store these values.

D.

Hash the username, encrypt the password, and store these values.

Full Access
Question # 52

A developer has completed the implementation of a REST API, but when it is executed, it returns a 401 error message. What must be done on the API to resolve the issue?

A.

Access permission to the resource must be granted, before the request.

B.

Configure new valid credentials.

C.

The requested API endpoint does not exist, and the request URL must be changed.

D.

Additional permission must be granted before the request can submitted.

Full Access
Question # 53

Refer to the exhibit.

A developer is creating a Python script to use the Webex Teams REST API to list joined spaces, retry after the server-specified amount of time if a “Too many requests” response is received, and print any other error that is received. Drag and drop the code snippets from the left onto the item numbers on the right that match the missing sections in the exhibit to complete the script. Not all code snippets are used.

Full Access
Question # 54

Refer to the exhibit.

An attempt to execute a CI/CD pipeline results m the error shown What is the cause of the error?

A.

The VCS repository is unavailable

B.

The unit tests failed to complete

C.

The built artifacts failed to publish to the target server

D.

The remote library repository is unavailable

Full Access