Weekend Sale Limited Time 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 2493360325

Good News !!! 350-901 Developing Applications using Cisco Core Platforms and APIs (DEVCOR) is now Stable and With Pass Result

350-901 Practice Exam Questions and Answers

Developing Applications using Cisco Core Platforms and APIs (DEVCOR)

Last Update 3 days ago
Total Questions : 363

Developing Applications using Cisco Core Platforms and APIs (DEVCOR) is stable now with all latest exam questions are added 3 days ago. Incorporating 350-901 practice exam questions into your study plan is more than just a preparation strategy.

By familiarizing yourself with the Developing Applications using Cisco Core Platforms and APIs (DEVCOR) exam format, identifying knowledge gaps, applying theoretical knowledge in Cisco practical scenarios, you are setting yourself up for success. 350-901 exam dumps provide a realistic preview, helping you to adapt your preparation strategy accordingly.

350-901 exam questions often include scenarios and problem-solving exercises that mirror real-world challenges. Working through 350-901 dumps allows you to practice pacing yourself, ensuring that you can complete all Developing Applications using Cisco Core Platforms and APIs (DEVCOR) exam questions within the allotted time frame without sacrificing accuracy.

350-901 PDF

350-901 PDF (Printable)
$53.2
$132.99

350-901 Testing Engine

350-901 PDF (Printable)
$58
$144.99

350-901 PDF + Testing Engine

350-901 PDF (Printable)
$72.8
$181.99
Question # 1

Refer to the exhibit.

Question # 1

A network engineer created a simple Python Flask application but must incorporate a CSRF token. Which code snippet must be added in the blank in the script to manually incorporate the token?

Options:

A.  

_access_tokenM value=M{{ csrf_token}}

B.  

_csrMoken" value="{{ csrf_grant()}}

C.  

_csrMoken" value="{{ csrf_token()}}

D.  

_xssjoken" value="{{ csrMoken}}

Discussion 0
Question # 2

A developer is creating a Python script to catch errors using REST API calls and to aid in debugging. Drag and drop the code from the bottom onto the box where the code is missing to implement control flow for REST API errors. Not all options are used.

Question # 2

Options:

Discussion 0
Question # 3

Refer to the exhibit.

Question # 3

Python threading allows a developer to have different parts of a program run concurrently and simplify a design. Drag and drop the code snippets from the left onto the item numbers on the right that match the missing sections in the exhibit to create a thread instance.

Question # 3

Options:

Discussion 0
Question # 4

Refer to the exhibit.

Question # 4

An application's REST API GET call is tested to the inventory database. Which missing code must be included to limit

the number of values that are returned from the query to 20?

Options:

A.  

Inventory=20

B.  

limit=?2Q

C.  

inventory=limit?20

D.  

inventory? Iimit20

Discussion 0
Question # 5

Refer to the exhibit.

Question # 5

Which type of python dependency file is shown?

Options:

A.  

setup.py

B.  

TOML

C.  

packages

D.  

requirements.txt

Discussion 0
Question # 6

Which configuration stop must be performed on a Cisco IOS XE device to present collected data in Cisco DNA Center?

Options:

A.  

Create an SNMPv3 user account.

B.  

Apply a telemetry profile.

C.  

Synchronize the device and the data collector.

D.  

Enable Cisco NetFlow collection.

Discussion 0
Question # 7

A developer is working on a live project and must apply a new feature. After the commit,the manager informs the team that the wrong file was applied. The developer must undo the single commit and apply the file with the name feature-App-UXU1411841916AD

D.  

Which command must the developer use?

Options:

A.  

git revert

B.  

git checkout

C.  

git clean

D.  

git reset

Discussion 0
Question # 8

Drag and drop the code from the bottom onto the box where the code is missing to create a new Cisco Webex space and attach a previously configured bot named 'sampleBot'. Not all options are used.

Question # 8

Options:

Discussion 0
Question # 9

Drag and drop the code from the bottom onto the box where the code is missing to enable an SSID by using the Cisco Meraki Dashboard API. Not all options are used.

Question # 9

Options:

Discussion 0
Question # 10

Refer to the exhibit.

Question # 10

The Ansible playbook is using the netconf_module to configure an interface using a YANG model. As part of this workflow, which YANG models augment the interface?

Options:

A.  

ietf-interfaces and ietf-ip

B.  

iana-if-type and ietf-interfaces

C.  

ietf-ip and openconfig-interface

D.  

ietf-ip and iana-if-type

Discussion 0
Question # 11

Drag and drop the code from the bottom onto the box where the code is missing to create a Puppet manifest that implements an NTP configuration when applied to a device in the master inventory. Not all options are used.

Question # 11

Options:

Discussion 0
Question # 12

An application is made up of multiple microservices, each communicating via APIs. One service is beginning to be a bottleneck for the application because it can take a lot of time to complete requests. An engineer tried adding additional instances of this service behind the load balancer, but it did not have any effect. Which application design change must be implemented m this scenario?

Options:

A.  

Move from synchronous to asynchronous interactions with the service and implement a message queue.

B.  

Deploy an API gateway to centralize all inbound communication requests and offload authentication

C.  

Vendor all dependencies into the service that is causing delays to remove external dependency checks.

D.  

Leverage serverless architecture instead of containers to gain the advantage of event driven APIs.

Discussion 0
Question # 13

A developer has created a local Docker alpine image that has the image ID 'dockapp432195596ffr' and tagged as ‘new’. Which command creates a running container based on the tagged image, with the container port 80 bound to port 8080 on the host?

Options:

A.  

docker build -p 8080:80 alpine new

B.  

docker exec -p 808080 alpine new

C.  

docker start -p 808080 alpine new

D.  

docker run -p 8080.80 alpine.now

Discussion 0
Question # 14

A developer must recommend an appropriate tool to deploy a configuration to hundreds of servers. The configuration management solution must meet these requirements.

• The servers must initiate the connection to obtain updates

• The configuration must be defined in a declarative style

Which tool should be used?

Options:

A.  

Chef

B.  

Terraform

C.  

Puppet

D.  

Ansible

Discussion 0
Question # 15

Question # 15

Refer to the exhibit Drag and drop the code snippets from the left onto the item numbers on the right that match the missing sections in the exhibit to complete the script to implement control flow.

Question # 15

Options:

Discussion 0
Question # 16

Refer to the exhibit.

Question # 16

Which action should be performed to avoid an SQL injection attack?

Options:

A.  

Encrypt the password that is used to connect to the database

B.  

Develop a denial of service response plan

C.  

Vacate the input on the platform variable

D.  

Compile the Python file instead of allowing live interpretation

Discussion 0
Question # 17

Which Puppet manifest changes the NTP server and generates the traffic from VLAN 15?

A)

Question # 17

B)

Question # 17

C)

Question # 17

D)

Question # 17

Options:

A.  

Option A

B.  

Option B

C.  

Option C

D.  

Option D

Discussion 0
Question # 18

Question # 18

Refer to the exhibit. Drag and drop parts of the URL from the left onto the item numbers on the right that match the missing sections in the exhibit to create the appropriate RESTCONF URL to query the VLAN configuration given this YANG model. Not all URL parts are used.

Question # 18

Options:

Discussion 0
Question # 19

A heterogeneous network of vendors and device types needs automating for better efficiency and to enable future automated testing. The network consists of switches, routers, firewalls and load balancers from different vendors, however they all support the NETCONF/RESTCONF configuration standards and the YAML models with every feature the business requires. The business is looking for a buy versus build solution because they

cannot dedicate engineering resources, and they need configuration diff and rollback functionality from day 1.

Which configuration management for automation tooling is needed for this solution?

Options:

A.  

Ansible

B.  

Ansible and Terraform

C.  

NSO

D.  

Terraform

E.  

Ansible and NSO

Discussion 0
Question # 20

Click on the resource lab in the top left comer to view resources to help with this question An engineer is managing a data center with 6000 Cisco UCS servers installed and running The engineer is asked to identify all resources where the model is in the UCSB family and the available memory is less than or equal to 5 GB Drag and drop the code from the bottom onto the blanks in the code snippet to construct a REST API call to accomplish this task Not all options are used.

Question # 20

Options:

Discussion 0
Question # 21

A developer deploys a web application in a local data center that is now experiencing high traffic load from users accessing data through REST API calls. Which approach enhances the responsiveness and performance of the API?

Options:

A.  

Use HTTP POST or other non-read methods for read requests when possible

B.  

Ensure that all read requests are clearly identified by the PUT method

C.  

Configure API payload to return errors in HTTP 200 responses

D.  

Use HTTP standard authorization header to submit authentication credentials

Discussion 0
Question # 22

Drag and drop the code from the bottom onto the box where the code is missing on the Dockerfile to containerize an application that listens on the specified TCP network port at runtime. Not all options are used.

Question # 22

Options:

Discussion 0
Question # 23

Drag and drop the code from the bottom onto the box where the code is missing to configure a router that runs Cisco IOS XE by using RESTCON

F.  

The API call is made to the management URL of the IOS XE device and on a registered port number. Errors that are caught during HTTP operation are registered. Not all options are used.

Question # 23

Options:

Discussion 0
Question # 24

Refer to the exhibit.

Question # 24

Drag and drop the code from the bottom onto the box where the code is missing to construct a Python script that will retrieve location data Not all options are used.

Question # 24

Options:

Discussion 0
Question # 25

Refer to the exhibit.

Question # 25

Which additional line results in the output of Test 1 upon execution of the docker run --rm devnet 1 command in a Dockerfile with this content?

Options:

A.  

CMD [“/bin/echo”, “Test”]

B.  

RUN [“/bin/echo”, “Test”]

C.  

ENTRYPOINT [“/bin/echo”, “Test”]

D.  

CMD [“/bin/echo Test”]

Discussion 0
Question # 26

Refer to the exhibit.

Question # 26

A Python script has these requirements

• Retrieve a list of Bluetooth clients seen by the access pants on a network.

• Print the content of the response

• Retrieve the next page only if it is available in the response headers

What must be added where the code is missing to get the remaining pages by using the next link from the link response header of the last request?

A)

Question # 26

B)

Question # 26

C)

Question # 26

D)

Question # 26

Options:

A.  

Option A

B.  

Option B

C.  

Option C

D.  

Option D

Discussion 0
Question # 27

An engineer is developing a web-based application that will be used as a central repository for the HR department The application needs to authenticate user access and encrypt communication. Drag and drop the steps from the left into the order on the right to install an application-specific SSL certificate.

Question # 27

Options:

Discussion 0
Question # 28

Which database type should be used to store data received from model-driven telemetry?

Options:

A.  

BigQuery database

B.  

Time series database

C.  

NoSQL database

D.  

PostgreSQL database

Discussion 0
Question # 29

Refer to the exhibit.

Question # 29

A Python developer is creating a wireless network device inventory application for local deployment of Cisco access points The developer is retrieving an access point ID by using a REST API The output indicates that there was a KeyError when parsing the JSON response. What returns the expected output of 266 at line 14?

A)

Question # 29

B)

Question # 29

C)

Question # 29

D)

Question # 29

Options:

A.  

Option

B.  

Option

C.  

Option

D.  

Option

Discussion 0
Question # 30

An Etag header is included in the HTTP response for an API resource. What are two benefits of using the value of the Etag for future interactions involving the same API resource? (Choose two.)

Options:

A.  

caching and optimization of response payloads

B.  

creating conditional requests

C.  

categorizing and comparing this API resource with others

D.  

checking the integrity of the resource

E.  

requesting the list of operations authorized for this resource

Discussion 0
Question # 31

What is the result of a successful OAuth2 authorization grant flow?

Options:

A.  

The user has the application rights that correspond to the user's role within the application's database

B.  

The application is provided with a token that allows actions on services on the user's behalf

C.  

The user has administrative rights to the application's backend services

D.  

The third-party service is provided with a token that allows actions to be performed

Discussion 0
Question # 32

Refer to the exhibit.

Question # 32

Drag and drop the steps from the left into the correct order of operation on the right for a successful OAuth2 three-legged authorization code grant flow.

Question # 32

Options:

Discussion 0
Question # 33

Why is end-to-end encryption deployed when exposing sensitive data through APIs?

Options:

A.  

Traffic is encrypted and decrypted at every hop in the network path.

B.  

Data transfers are untraceable from source to destination.

C.  

Data cannot be read or modified other than by the true source and destination.

D.  

Server-side encryption enables the destination to control data protection.

Discussion 0
Question # 34

Refer to the exhibit.

Question # 34

An engineer needs to change the IP address via RESTCOMF on interface GigabitEthernet2. An error message is received when the script is run. Which amendment to the code will result in a successful RESTCONF action?

Options:

A.  

Change POST to PATCH.

B.  

Issue a DELETE before POST.

C.  

Issue a DELETE before PATCH

D.  

Change POST to GET

Discussion 0
Question # 35

A timeframe custom dashboard must be developed to present data collected from Cisco Meraki. The dashboard must include a wireless health alert count. What needs to be built as a prerequisite?

Options:

A.  

A publicly available HTTP server to receive Meraki Webhooks from the Meraki Dashboard API

B.  

A publicly available HTTP server to receive Meraki Webhooks from the Meraki Scanning API

C.  

A daemon to consume the Wireless Health endpoint of the Meraki Scanning API

D.  

A daemon to consume the Wireless Health endpoint of the Meraki Dashboard API

Discussion 0
Question # 36

Refer to the exhibit.

Question # 36

Which command results in a detached HEAD scenario?

Options:

A.  

git checkout 5af25b

B.  

git checkout Branch-5

C.  

git checkout master

D.  

git checkout log -2

Discussion 0
Question # 37

Which two types of storage are supported for app hosting on a Cisco Catalyst 9000 Series Switch? (Choose two.)

Options:

A.  

external USB storage

B.  

internal SSD

C.  

CD-ROM

D.  

SD-card

E.  

bootflash

Discussion 0
Question # 38

A developer is working on a new feature in a branch named 'newfeay000222118' and the current working primary branch is named 'pnm409024967' The developer requires a merge commit during a fast forward merge for record-keeping purposes. Which Git command must Be used?

A)

Question # 38

B)

Question # 38

C)

Question # 38

D)

Question # 38

Options:

A.  

Option A

B.  

Option B

C.  

Option C

D.  

Option D

Discussion 0
Question # 39

Drag and drop the code from the bottom onto the box where the code is missing to create a new IKEv2 policy Not all options are used

Question # 39

Options:

Discussion 0
Question # 40

Drag and drop the steps from the left into the order on the right to configure and install a container on a Cisco Catalyst 9000 Series Switch.

Question # 40

Options:

Discussion 0
Question # 41

Refer to the exhibit.

Question # 41

Which two functions are performed by the load balancer when it handles traffic originating from the Internet destined to an application hosted on the file server farm? (Choose two.)

Options:

A.  

Terminate the TLS over the UDP connection from the router and originate an HTTPS connection to the selected server.

B.  

Terminate the TLS over the UDP connection from the router and originate an HTTP connection to the selected server.

C.  

Terminate the TLS over the TCP connection from the router and originate an HTTP connection to the selected server.

D.  

Terminate the TLS over the TCP connection from the router and originate an HTTPS connection to the selected server.

E.  

Terminate the TLS over the SCTP connection from the router and originate an HTTPS connection to the selected server.

Discussion 0
Question # 42

Which two principles are included in the codebase tenet of the 12-factor app methodology? (Choose two.)

Options:

A.  

An application is always tracked in a version control system.

B.  

There are multiple codebases per application.

C.  

The codebase is the same across all deploys.

D.  

There can be a many-to-one correlation between codebase and application.

E.  

It is only possible to have one application deployment per codebase.

Discussion 0
Question # 43

What securely stores and encrypts the API keys and tokens that are used for an application deployment?

Options:

A.  

ITSM

B.  

Artifactory

C.  

GitHub

D.  

Vault

Discussion 0
Question # 44

How does the use of release packaging allow dependencies to be effectively managed during deployments?

Options:

A.  

dependencies are staggered between multiple releases

B.  

designed to prevent any dependencies between release units

C.  

dependencies are tested after the release is deployed

D.  

removal of release units if they have issues in testing

Discussion 0
Question # 45

Refer to the exhibit.

Question # 45

Which set of API requests must be executed by a Webex Teams bot after receiving a webhook callback to process messages in a room and reply with a new message back to the same room?

Question # 45

Options:

A.  

Option A

B.  

Option B

C.  

Option C

D.  

Option D

Discussion 0
Question # 46

Refer to the exhibit.

Question # 46

A developer must review an intern's code for a script they wrote to automate backups to the storage server. The script must connect to the network device and copy the running-config to the server. When considering maintainability, which two changes must be made to the code? (Choose two.)

Options:

A.  

Rename the class to "ArchiveManager".

B.  

The code is incorrect because the class does not have an__init__() method.

C.  

The command sent to the network device is incorrect.

D.  

Refactor the code placing the "for" loop steps inside a single nc method.

E.  

The intern must use IP addresses because DNS is unreliable.

Discussion 0
Question # 47

What is a consideration for using gRPC as the model-driven telemetry protocol on a Cisco IOS XE device?

Options:

A.  

XML-based transmission format

B.  

works in dial-out mode

C.  

human-readable transmission format

D.  

works in call-out mode

Discussion 0
Question # 48

Refer to the exhibit.

Question # 48

Refer to the exhibit A Docker swarm service is currently running m a local data center The service is hosting an HTML website it the container fads then the service becomes unavailable The design must meet these requirements

• The service must be highly available and resilient against a data center outage.

• The service must be accessible from a single URL

• The HTTP session must remain on the server from which the original request was sent

• Failure of the server must force the client to reconnect

Which two design approaches must be used to meet the requirements? (Choose two.)

Options:

A.  

Create another swarm cluster within a data center and deploy a secondary instance of the service.

B.  

Create another node in the swarm duster to scale the service across the nodes over two replicas.

C.  

Configure an external load balancer to route requests to the swarm service by using session persistence

D.  

Scale the Docker swarm service to 2 and set endpoint-mode to DNSRR instead of the default value of VIP

E.  

Configure a routing mesh to route requests to the swarm service by using NAT on the network side

Discussion 0
Question # 49

Which two techniques protect against injection attacks? (Choose two.)

Options:

A.  

input validation

B.  

trim whitespace

C.  

limit text areas to 255 characters

D.  

string escaping of user free text and data entry

E.  

only use dropdown, checkbox, and radio button fields

Discussion 0
Question # 50

Drag and drop the code from the bottom onto the box where the code is missing to stop the REST API requests if a 'Too Many Requests" response is received Not all options are used.

Question # 50

Options:

Discussion 0
Question # 51

Drag and drop the code from the bottom onto the box where the code is missing to delete a host object by using the Cisco Firepower Device Manager API Not all options are used.

Question # 51

Options:

Discussion 0
Question # 52

What is an effective logging strategy according 10 the 12-factor app tenets?

Options:

A.  

Capture togs by the execution environment and route to a centralized destination

B.  

Tag and save togs in a local document database that has querying capabilities.

C.  

Back up log files in a high-availability remote cluster on the public cloud

D.  

Timestamp and save logs in a local time-series database that has querying capabilities

Discussion 0
Question # 53

Refer to the exhibit.

Question # 53

A network engineer developed an Ansible playbook and committed it to GitLab. A GitLab CI pipeline is started but immediately fails. What is the issue?

Options:

A.  

The runner task uses an incorrect parameter.

B.  

The Ansible playbook task has a formatting issue.

C.  

The Ansible playbook has an undefined variable.

D.  

The runner is running the wrong Docker version.

Discussion 0
Question # 54

Drag and drop the expressions from below onto the code to implement error handling. Not all options are used.

Question # 54

Options:

Discussion 0
Get 350-901 dumps and pass your exam in 24 hours!

Free Exams Sample Questions