Summer Special Limited Time Flat 70% Discount offer - Ends in 0d 00h 00m 00s - Coupon code: 70spcl

Cisco 350-901 Developing Applications using Cisco Core Platforms and APIs (DEVCOR) Exam Practice Test

Page: 1 / 36
Total 363 questions

Developing Applications using Cisco Core Platforms and APIs (DEVCOR) Questions and Answers

Question 1

What is a risk to data privacy during the storage and transmission of data?

Options:

A.

The risk of exposure is increased when data is shared between applications.

B.

The transfer of unencrypted data between storage devices increases the risk of exposure.

C.

Data breaches cause ongoing exposure of personal information.

D.

The transfer of unencrypted personally identifiable financial information from a storage device increases the risk of a data broach.

Question 2

Drag and drop the code from the bottom onto the box where the code is missing the snippet to complete this Ansible Playbook. Not all options are used.

Question # 2

Options:

Question 3

Which function does Fluentd fulfill for application logging in Kubernetes?

Options:

A.

logging agent for distribution

B.

backend time series database storage

C.

monitoring and log visualization

D.

messaging queueig infrastructure

Question 4

Question # 4Question # 4

Question # 4

Click on the Meraki Resources tab in the left corner to view Meraki documentation to help with this question.Drag and drop the parts of the python code from the left onto the item numbers on the right that match the missing sections in the exhibit to enable an SSID. Not all code parts are used.

Question # 4

Options:

Question 5

Refer to the exhibit.

Question # 5

An attempt to execute a CI/CD pipeline results m the error shown What is the cause of the error?

Options:

A.

The VCS repository is unavailable

B.

The unit tests failed to complete

C.

The built artifacts failed to publish to the target server

D.

The remote library repository is unavailable

Question 6

A developer must create VLANs 2-5 on a remote Cisco NX-OS switch by using an Ansible playbook The playbook must meet these requirements

• Configure the VLANs and a name for each VLAN

• Only run against the switches inventory group

• Execute from the local Ansible controller

• Prevent the collection of system information prior to execution

Which playbook must be used?

A)

Question # 6

B)

Question # 6

C)

Question # 6

D)

Question # 6

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 7

Refer to the exhibit.

Question # 7

Which code snippet completes this code to handle API rate-limit?

Options:

A.

response.status_code !*= 408

B.

response.status != 408

C.

response.status_code != 429

D.

response.status_code == 429

Question 8

A developer is working on a new feature in a branch named 'newfeay000222118' and the current working primary branch is named 'pnm409024967' The developer requires a merge commit during a fast forward merge for record-keeping purposes. Which Git command must Be used?

A)

Question # 8

B)

Question # 8

C)

Question # 8

D)

Question # 8

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 9

What are two benefits of using distributed log collectors? (Choose two.)

Options:

A.

supports multiple transport protocols such as TCP/UDP

B.

improves performance and reduces resource consumption

C.

provides flexibility due to a wide range of plugins and accepted log formats

D.

enables extension of logs with fields and export to backend systems

E.

buffers and resends data when the network is unavailable

Question 10

A developer must package an application for Kubernetes to integrate into a prebuilt CD environment. The application utilizes a Docker image from Cisco DevNet public repository and is accessible from a specific port of the container. Drag and drop the code from the bottom onto the box where the code is missing in the Kubernetes YAML configuration file. Not all options are used.

Question # 10

Options:

Question 11

A new record-keeping application for employees to track customer orders must be deployed to a company's existing infrastructure. The host servers reside in a data center in a different country to where the majority of users work. The new network configuration for the database server is: •IP: 10.8.32.10

• Subnet Mask: 255.255.255.0

• Hostname: CustOrd423320458-Prod-010

• MAC: 18-46-AC-6F-F4-52.

The performance of the client-side application is a priority due to the high demand placed on it by employees. Which area should the team consider in terms of impact to application performance due to the planned deployment?

Options:

A.

jitter

B.

decreased bandwidth

C.

latency

D.

connectivity loss

Question 12

Which Git command enables the developer to revert back to f414f31 commit to discard changes in the current working tree?

Options:

A.

git reset-hard f414f31

B.

git reset checkout-hard f414f31

C.

git reset-soft f414f31

D.

git checkout f414f31

Question 13

Drag and drop the code from the bottom onto the box where the code is missing on the Dockerfile to containerize an application that listens on the specified TCP network port at runtime. Not all options are used.

Question # 13

Options:

Question 14

Drag and drop the code snippets from the bottom onto the boxes where the code is missing to complete the API call to implement error handling Not all options are used.

Question # 14

Options:

Question 15

Drag and drop the code from the bottom onto the box where the code is missing in the Python code to query for user permissions while mitigating against SQL Injection Not all options are used.

Question # 15

Options:

Question 16

Refer to the exhibit.

Question # 16

Which parameter is missing from the JSON response to confirm the API version that is

used?

Options:

A.

version 4

B.

v 10

C.

2

D.

version 2

Question 17

Drag and drop the code onto the snippet to update a SSID in Meraki using the Dashboard API. Not all options are used.

Question # 17

Options:

Question 18

Refer to the exhibit.

Question # 18

Which code snippet must be added to the blank in the code to automate the evaluation and handling of errors due to wrong credentials when Basic Authorization is used?

A)

Question # 18

B)

Question # 18

C)

Question # 18

D)

Question # 18

Options:

A.

Option

B.

Option

C.

Option

D.

Option

Question 19

Question # 19

Refer to the exhibit. The self-service Webex Teams bot is failing when many users attempt to interact with it at the same time. Drag and drop the code snippets from the left onto the correct item numbers on the right that match the missing sections in the exhibit to complete this code to handle this high-load situation.

Question # 19

Options:

Question 20

An organization manages a large cloud-deployed application that employs a microservices architecture across multiple data centers. Reports have received about application slowness. The container orchestration logs show that faults have been raised in a variety of containers that caused them to fail and then spin up brand new instances.

Which two actions can improve the design of the application to identify the faults? (Choose two.)

Options:

A.

Automatically pull out the container that fails the most over a time period.

B.

Implement a tagging methodology that follows the application execution from service to service.

C.

Add logging on exception and provide immediate notification.

D.

Do a write to the datastore every time there is an application failure.

E.

Implement an SNMP logging system with alerts in case a network link is slow.

Question 21

When end-to-end encryption is implemented, which area is most vulnerable to exploitation?

Options:

A.

cryptographic key exchange

B.

endpoint security

C.

cryptographic key generation

D.

security of data in transit

Question 22

What is a benefit of using model-driven telemetry?

Options:

A.

enables operational data to be collected at higher rates and a higher scale

B.

enables the application to pull data faster than pushing the data

C.

reduces the load on the server by enabling the client to pull data

D.

simplifies the development of clients by using a single encoding standard for the data

Question 23

Refer to the exhibit.

Question # 23

This snippet of a script has recently started exiting abnormally with an exception stating “Unexpected HTTP Response code: 429”.

Which solution handles rate limiting by the remote API?

Question # 23

Question # 23

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 24

Drag and drop the code from the bottom onto the box where the code is missing to create a Puppet manifest that implements an NTP configuration when applied to a device in the master inventory. Not all options are used.

Question # 24

Options:

Question 25

Question # 25

Refer to the exhibit Drag and drop the code snippets from the left onto the item numbers on the right that match the missing sections in the exhibit to complete the script to implement control flow.

Question # 25

Options:

Question 26

An application must be able to print the values of the variables in specific modules. Different message levels will be used for production and for development. Proof of access and activity must be documented. What must be included in the implementation to support these observability requirements?

Options:

A.

print

B.

metrics

C.

logging

D.

streaming

Question 27

A developer deploys a SQLite database in a Docker container. Single-use secret keys are generated each time

a user accesses the database. The keys expire after 24 hours. Where should the keys be stored?

Options:

A.

Outside of the Docker container in the source code of applications that connect to the SQLite database.

B.

In a separate file inside the Docker container that runs the SQLite database.

C.

In an encrypted database table within the SQLite database.

D.

In a separate storage volume within the Docker container.

Question 28

Question # 28

Question # 28

Refer to the exhibit above and click on the IETF Routing tab in the top left corner to help with this question. A developer is trying to update the routing instance by adding a new route to the routes list using the URL in the exhibit. What action must be taken to fix the error being received?

Options:

A.

Fix the body being sent to update the routes list.

B.

Update the authorization credentials.

C.

Change the url to ''/ietf-routing:routing/routing-instance=default''.

D.

Change the URL to ''/ietf-routing:routing-instance/default''.

E.

Change the HTTP Method being used to make the change

Question 29

Refer to the exhibit.

Question # 29

A developer must review an intern's code for a script they wrote to automate backups to the storage server. The script must connect to the network device and copy the running-config to the server. When considering maintainability, which two changes must be made to the code? (Choose two.)

Options:

A.

Rename the class to "ArchiveManager".

B.

The code is incorrect because the class does not have an__init__() method.

C.

The command sent to the network device is incorrect.

D.

Refactor the code placing the "for" loop steps inside a single nc method.

E.

The intern must use IP addresses because DNS is unreliable.

Question 30

A timeframe custom dashboard must be developed to present data collected from Cisco Meraki. The dashboard must include a wireless health alert count. What needs to be built as a prerequisite?

Options:

A.

A publicly available HTTP server to receive Meraki Webhooks from the Meraki Dashboard API

B.

A publicly available HTTP server to receive Meraki Webhooks from the Meraki Scanning API

C.

A daemon to consume the Wireless Health endpoint of the Meraki Scanning API

D.

A daemon to consume the Wireless Health endpoint of the Meraki Dashboard API

Question 31

A developer has issued git add file1 and file2 test.py command to add the three files for the next commit, but then decides to executed test.py from this command. Which command needs to be used to exclude test.py from this commit but keep the rest of the files?

Options:

A.

git clean — test.py

B.

git reset - test py

C.

git checkout - file1 file2

D.

git stash -- file1 file 2

Question 32

A developer is working on an enhancement for an application feature and has made changes to a branch called ‘devcor-432436127a-enhance4‘. When merging the branch to production, conflicts occurred. Which Git command must the developer use to recreate the pre-merge state?

Options:

A.

git merge -no-edit

B.

git merge -abort

C.

git merge -revert

D.

git merge —comrmt

Question 33

Drag and drop the characteristics from the left onto the correct data processing techniques on the right, in the context of GDPR.

Question # 33

Options:

Question 34

The UCS Python SDK includes modules for Service Profile template creation. Which two UCS Service Profile template types are supported? (Choose two.)

Options:

A.

initial-template

B.

updating-template

C.

abstract-template

D.

attached-template

E.

base-template

Question 35

Question # 35

Refer to the exhibit. A developer must create a new network object named testnetwork by using the Cisco Firepower Device Management API. The script must also handle any exceptions that occur during the request and print out any resulting errors. Which script must be used?

Question # 35

Question # 35

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 36

Refer to the exhibit.

Question # 36

A company has extended networking from the data center to the cloud through Transit VPC.

Which two statements describe the benefits of this approach? (Choose two.)

Options:

A.

Dynamic routing combined with multi-AZ- deployment creates a robust network infrastructure.

B.

VPC virtual gateways provide highly available connections to virtual networks.

C.

Dedicated VPC simplifies load balancing by combining internal and external web services.

D.

VPC virtual gateways provide more secure connections to virtual networks.

E.

Dedicated VPC simplifies routing by not combining this service with other shared services.

Question 37

A team is developing a cloud-native application for network monitoring and management of various devices. An increased growth rate of users is expected. The solution must be easily managed and meet these requirements:

•able to use dependencies

•easy disposability

•flexible configuration

Which application design approach must be used?

Options:

A.

waterfall model

B.

12-factor app framework

C.

object-oriented programming

D.

agile software development

Question 38

Which security approach should be used for developing a REST API?

Options:

A.

Use custom security relevant HTTP response codes

B.

Utilise TLS for end to end encryption

C.

Add an API key to each URL string

D.

Utilize CORS headers

Question 39

Refer to the exhibit.

Question # 39

The YAML represented is using the ios_vrf module. As part of the Ansible playbook workflow, what is the result when this task is run?

Options:

A.

VRFs not defined in the host_vars file are removed from the device.

B.

VRFs not defined in the host_vars file are added to the device, and any other VRFs on the device remain.

C.

VRFs defined in the host_vars file are removed from the device.

D.

VRFs are added to the device from the host_vars file, and any other VRFs on the device are removed.

Question 40

Question # 40

Question # 40

Click on the GET Resource button above to view resources that will help with this question. An engineer is managing a DC with 6000 Cisco UCS servers installed and running. The engineer has been asked to identify all resources where the model is in the UCSB family and the available memory is less than or equal to 5 GB. Which REST API call accomplishes this task?

Options:

A.

GET/api/v1/compute/RackUnits?$select=Vendor,Model,Serial&$filter=not(Model eq ‘UCSC’) and AvailableMemory le 5000

B.

GET/api/v1/compute/RackUnits?$select=Vendor,Model,Serial&$filter=Model eq ‘UCSB’ and AvailableMemory lt 5000

C.

GET/api/v1/compute/RackUnits?$select=Vendor,Model,Serial&$filter=contains(Model, UCSB’) and AvailableMemory lt 5000

D.

GET/api/v1/compute/RackUnits?$select=Vendor,Model,Serial&$filter=contains(Model, UCSB’) and AvailableMemory le 5000

Question 41

Refer to the exhibit.

Question # 41

Drag and drop the steps from the left into the order of operation on the right for a successful OAuth2 three-legged authorization code grant flow,

Options:

Question 42

Refer to the exhibit.

Question # 42

Question # 42

The Python script is supposed to make an API call to Cisco DNA Center querying a wireless profile for the “ChicagoCampus” and then parsing out its enable FlexConnect value. Drag and drop the parts of the Python code from the left onto the item numbers on the right that match the missing sections in the exhibit.

Question # 42

Options:

Question 43

The Meraki API URL https://api.meraki.com/api/v0/networks/123456789/ssids/2 has been stored in the environment variable meraki_url and the API key has been stored in meraki_api_key. Which snippet presents the API call to configure, secure and enable an SSID using the Meraki API?

A)

Question # 43

B)

Question # 43

C)

Question # 43

D)

Question # 43

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 44

Drag and drop the code from the bottom onto the box where the code is missing to construct a UCS XML API request to generate two service profiles from the template org-root/is-service-template. Not at options are used

Question # 44

Options:

Question 45

A developer is designing an application that uses confidential information for a company and its clients. The developer must implement different secret storage techniques for each handled secret to enforce security policy compliance within a project. Drag and drop the security policy requirements from the left onto the storage solutions on the right

Question # 45

Options:

Question 46

A heterogeneous network of vendors and device types needs automating for better efficiency and to enable future automated testing. The network consists of switches, routers, firewalls and load balancers from different vendors, however they all support the NETCONF/RESTCONF configuration standards and the YAML models with every feature the business requires. The business is looking for a buy versus build solution because they

cannot dedicate engineering resources, and they need configuration diff and rollback functionality from day 1.

Which configuration management for automation tooling is needed for this solution?

Options:

A.

Ansible

B.

Ansible and Terraform

C.

NSO

D.

Terraform

E.

Ansible and NSO

Question 47

Drag and drop the code snippets from the bottom onto the boxes where the code is missing to deploy three Cisco UCS servers each from a different template Not all options ate used.

Question # 47

Options:

Question 48

A developer releases a new application for network automation of Cisco devices deployed m a local data center. The application utilizes complex design patterns such as microservices that host multiple third-party libraries and programming languages. The development must be simplified by implementing an observability-driven development lifecycle. Which two considerations must be taken to meet the requirements? (Choose two.)

Options:

A.

description of low-level errors

B.

which KPls to monitor

C.

relevant metrics to expose

D.

which monitoring tools to use

E.

identifying customer priorities

Question 49

Refer to the exhibit.

Question # 49

Interface Lookback 1 must be created with IP address 10.30.0.1/24 in a Cisco IOS XE device using RESTCONF. The schema that is defined by the exhibit must be used. Which body and URI should be used for this operation?

A)

Question # 49

B)

Question # 49

C)

Question # 49

D)

Question # 49

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 50

Click on the GET Resource button above to view resources that will help with this question.

Question # 50

Question # 50

Question # 50

An engineer is managing a DC with 6000 Cisco UCS servers installed and running. The engineer has been asked to identify all resources where the model is in the UCSB family and the available memory is less than or equal to 5 GB.

Which REST API call accomplishes this task?

Options:

A.

GET/api/v1/compute/RackUnits?$select=Vendor,Model,Serial&$filter=not(Model eq ‘UCSC’) and AvailableMemory le 5000

B.

GET/api/v1/compute/RackUnits?$select=Vendor,Model,Serial&$filter=Model eq ‘UCSB’ and AvailableMemory lt 5000

C.

GET/api/v1/compute/RackUnits?$select=Vendor,Model,Serial&$filter=contains(Model, UCSB’) and AvailableMemory lt 5000

D.

GET/api/v1/compute/RackUnits?$select=Vendor,Model,Serial&$filter=contains(Model, UCSB’) and AvailableMemory le 5000

Question 51

Refer to the exhibit Pipenv is used to manage dependencies The test funs successfully on a local environment. What is the reason for the error when running the test on a CI'CD pipeline?

Options:

A.

The piple in the local environment was not pushed to the remote repository

B.

All the unit tests in testsum py failed

C.

Pytest did not detect any functions that start with test_'.

D.

Nose2 was not used as the test runner

Question 52

Refer to the exhibit.

Question # 52

Which type of python dependency file is shown?

Options:

A.

setup.py

B.

TOML

C.

packages

D.

requirements.txt

Question 53

A developer is working on a bug fix. The existing branch named ‘bugfix05328’ needs to be merged with the current working primary branch named ‘prim404880077’. All changes must be integrated into a single commit instead of preserving them as individual commits. Which git command must be used?

Options:

A.

git checkout – –squash bugfix05328

B.

git merge – –squash bugfix05328

C.

git rebase – –merge bugfix05328

D.

git push – –rebase bugfix05328

Question 54

Refer to the exhibit.

Question # 54

The cisco_devnet Docker swarm service runs across five replicas.The development team tags and imports a new image named devnet/ test:1.1 and requests that the image be upgraded on each container.There must be no service outages during the upgrade process. Which two design approaches must be used? (Choose two.)

Options:

A.

Enable parallel upgrades by using the docker service update command

B.

Ensure that the service replicas are set to a minimum of 5

C.

Implement rolling upgrades by using the docker service update command

D.

Ensure that the service is hosted behind a VIP with no session persistence

E.

Update the restart policy of the containers to restart upon failure

Page: 1 / 36
Total 363 questions