Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: myex65

Home > Cisco > Cisco Certified DevNet Professional > 350-901

350-901 Developing Applications using Cisco Core Platforms and APIs (DEVCOR) Question and Answers

Question # 4

Drag and drop the code from the bottom onto the box where the code is missing in the Python code to query for user permissions while mitigating against SQL Injection Not all options are used.

Full Access
Question # 5

Which security approach should be used for developing a REST API?

A.

Use custom security relevant HTTP response codes

B.

Utilise TLS for end to end encryption

C.

Add an API key to each URL string

D.

Utilize CORS headers

Full Access
Question # 6

An engineer is developing a web-based application that will be used as a central repository for the HR department The application needs to authenticate user access and encrypt communication. Drag and drop the steps from the left into the order on the right to install an application-specific SSL certificate.

Full Access
Question # 7

A new record-keeping application for employees to track customer orders must be deployed to a company's existing infrastructure. The host servers reside in a data center in a different country to where the majority of users work. The new network configuration for the database server is: •IP: 10.8.32.10

• Subnet Mask: 255.255.255.0

• Hostname: CustOrd423320458-Prod-010

• MAC: 18-46-AC-6F-F4-52.

The performance of the client-side application is a priority due to the high demand placed on it by employees. Which area should the team consider in terms of impact to application performance due to the planned deployment?

A.

jitter

B.

decreased bandwidth

C.

latency

D.

connectivity loss

Full Access
Question # 8

Refer to the exhibit.

A network engineer created a simple Python Flask application but must incorporate a CSRF token. Which code snippet must be added in the blank in the script to manually incorporate the token?

A.

_access_tokenM value=M{{ csrf_token}}

B.

_csrMoken" value="{{ csrf_grant()}}

C.

_csrMoken" value="{{ csrf_token()}}

D.

_xssjoken" value="{{ csrMoken}}

Full Access
Question # 9

Refer to the exhibit.

The YAML represented is using the ios_vrf module. As part of the Ansible playbook workflow, what is the result when this task is run?

A.

VRFs not defined in the host_vars file are removed from the device.

B.

VRFs not defined in the host_vars file are added to the device, and any other VRFs on the device remain.

C.

VRFs defined in the host_vars file are removed from the device.

D.

VRFs are added to the device from the host_vars file, and any other VRFs on the device are removed.

Full Access
Question # 10

Refer to the exhibit.

Which set of API requests must be executed by a Webex Teams bot after receiving a webhook callback to process messages in a room and reply with a new message back to the same room?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 11

What is the gRPC Network Management Interface protocol?

A.

a unified management protocol for streaming telemetry and database logging

B.

a configuration management protocol for monitoring

C.

a protocol for configuration management and streaming telemetry

D.

a logging protocol used across database servers

Full Access
Question # 12

Refer to the exhibit. A developer wants to automatically deploy infrastructure for a containerized application. A .gitlab-ci.yml file must describe a pipeline that builds a container based on a supplied Dockerfile and executes an Ansible playbook on the configured container. What must be added where the code S missing to complete the script?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 13

Refer to the exhibit. The self-service Webex Teams bot is failing when many users attempt to interact with it at the same time. Drag and drop the code snippets from the left onto the correct item numbers on the right that match the missing sections in the exhibit to complete this code to handle this high-load situation.

Full Access
Question # 14

While working with the Webex Teams API, on an application that uses end-to-end encryption, a webhook has

been received. What must be considered to read the message?

A.

Webhook information cannot be used to read the message because of end-to-end encryption. The API key

is needed to decrypt the message.

B.

Webhook returns the full unencrypted message. Only the body is needed to query the API.

C.

Webhook returns a hashed version of the message that must be unhashed with the API key.

D.

Webhook returns message identification. To query, the API is needed for that message to get the decrypted

information.

Full Access
Question # 15

A developer deploys a web application in a local data center that is now experiencing high traffic load from users accessing data through REST API calls. Which approach enhances the responsiveness and performance of the API?

A.

Use HTTP POST or other non-read methods for read requests when possible

B.

Ensure that all read requests are clearly identified by the PUT method

C.

Configure API payload to return errors in HTTP 200 responses

D.

Use HTTP standard authorization header to submit authentication credentials

Full Access
Question # 16

Refer to the exhibit.

An application's REST API GET call is tested to the inventory database. Which missing code must be included to limit

the number of values that are returned from the query to 20?

A.

Inventory=20

B.

limit=?2Q

C.

inventory=limit?20

D.

inventory? Iimit20

Full Access
Question # 17

Which two strategies are used to protect personally identifiable information? (Choose two.)

A.

Encrypt data in transit.

B.

Encrypt hash values of data.

C.

Encrypt data at rest.

D.

Only hash usernames and passwords for efficient lookup.

E.

Only encrypt usernames and passwords for efficient lookup.

Full Access
Question # 18

Refer to the exhibit. The JSON response is received from the Meraki location API. Which parameter is missing?

A.

apMac

B.

clientMac

C.

clientId

D.

accesspoint

Full Access
Question # 19

Drag and drop the steps from the left into the order on the right to configure and install a container on a Cisco Catalyst 9000 Series Switch.

Full Access
Question # 20

Refer to the exhibit.

An engineer is managing a network that consists of Cisco IOSXE devices. There is a need to retrieve the details of the interface GigabitEthernet2 using RESTCONF. Which URI will accomplish this by providing the same response as shown in the JSON body?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 21

Refer to the exhibit.

Which two functions are performed by the load balancer when it handles traffic originating from the Internet destined to an application hosted on the file server farm? (Choose two.)

A.

Terminate the TLS over the UDP connection from the router and originate an HTTPS connection to the selected server.

B.

Terminate the TLS over the UDP connection from the router and originate an HTTP connection to the selected server.

C.

Terminate the TLS over the TCP connection from the router and originate an HTTP connection to the selected server.

D.

Terminate the TLS over the TCP connection from the router and originate an HTTPS connection to the selected server.

E.

Terminate the TLS over the SCTP connection from the router and originate an HTTPS connection to the selected server.

Full Access
Question # 22

Refer to the exhibit.

Drag and drop the code from the bottom onto the box where the code is missing to construct a Python script that will retrieve location data Not all options are used.

Full Access
Question # 23

Refer to the exhibit.

Drag and drop the components from the Oauth2 authorization protocol flow on the left onto the letter that matches the location in the exhibit.

Full Access
Question # 24

The Meraki API URL https://api.meraki.com/api/v0/networks/123456789/ssids/2 has been stored in the environment variable meraki_url and the API key has been stored in meraki_api_key. Which snippet presents the API call to configure, secure and enable an SSID using the Meraki API?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 25

An organization manages a large cloud-deployed application that employs a microservices architecture. No notable issues occur with downtime because the services of this application are redundantly deployed over three or more data center regions. However, several times a week reports are received about application slowness. The container orchestration logs show faults in a variety of containers that cause them to fail and then spin up brand new.

Which action must be taken to improve the resiliency design of the application while maintaining current scale?

A.

Update the base image of the containers.

B.

Test the execution of the application with another cloud services platform.

C.

Increase the number of containers running per service.

D.

Add consistent “try/catch(exception)” clauses to the code.

Full Access
Question # 26

Drag and drop the code snippets from the bottom onto the boxes where the code is missing to deploy three Cisco UCS servers each from a different template Not all options ate used.

Full Access
Question # 27

Two Elasticsearch database servers use bidirectional asynchronous data replication Both servers accept writes from clients The design must meet these requirements:

• The cluster must survive if a fault occurs that causes the network connection to go down between nodes

• The data must remain consistent if communication between nodes fails.

• The data must be spread evenly across all nodes in the cluster.

Which design approach must be used to meet the requirements?

A.

Set the initial voting configuration to force a specific node as the master.

B.

Scale the master nodes down to a single node.

C.

Set the minimum_master_nodes to 2 in the configuration.

D.

Add a third cluster node to provide majority votes.

Full Access
Question # 28

Drag and drop the code onto the snippet to update a SSID in Meraki using the Dashboard API. Not all options are used.

Full Access
Question # 29

Drag and drop the code from the bottom onto the box where the code is missing to create a Webex space Not all options are used.

Full Access
Question # 30

Drag and drop the code from the bottom onto the box where the code is missing on the Ansible task to enable a VLAN on a Meraki MX Device, Not all options are used.

Full Access
Question # 31

A developer has just completed the configuration of an API that connects sensitive internal systems. Based on company policies, the security of the data is a high priority.

Which approach must be taken to secure API keys and passwords?

A.

Embed them directly in the code.

B.

Store them in a hidden file.

C.

Store them inside the source tree of the application.

D.

Change them periodically.

Full Access
Question # 32

Refer to the exhibit.

Refer to the exhibit A Docker swarm service is currently running m a local data center The service is hosting an HTML website it the container fads then the service becomes unavailable The design must meet these requirements

• The service must be highly available and resilient against a data center outage.

• The service must be accessible from a single URL

• The HTTP session must remain on the server from which the original request was sent

• Failure of the server must force the client to reconnect

Which two design approaches must be used to meet the requirements? (Choose two.)

A.

Create another swarm cluster within a data center and deploy a secondary instance of the service.

B.

Create another node in the swarm duster to scale the service across the nodes over two replicas.

C.

Configure an external load balancer to route requests to the swarm service by using session persistence

D.

Scale the Docker swarm service to 2 and set endpoint-mode to DNSRR instead of the default value of VIP

E.

Configure a routing mesh to route requests to the swarm service by using NAT on the network side

Full Access
Question # 33

Which transport protocol is used by gNMI?

A.

HTTP/2

B.

HTTP 1.1

C.

SSH

D.

MQTT

Full Access
Question # 34

Drag and drop the operations from the left into the order on the right to create a web dashboard that displays Cisco DNA Center data for an organization.

Full Access
Question # 35

Refer to the exhibits. Which data payload completes the CURL command to run the create port object API call In Cisco Firepower Threat Defense?

Refer to the exhibits. Which data payload completes the CURL command to run the create port object API call In Cisco Firepower Threat Defense?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 36

Refer to the exhibit.

A developer created the code, but it fails to execute. Which code snippet helps to identify the issue?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 37

Which Git command enables the developer to revert back to f414f31 commit to discard changes in the current working tree?

A.

git reset-hard f414f31

B.

git reset checkout-hard f414f31

C.

git reset-soft f414f31

D.

git checkout f414f31

Full Access
Question # 38

Which two data encoding techniques are supported by gRPC? (Choose two.)

A.

XML

B.

JSON

C.

ASCII

D.

ProtoBuf

E.

YAML

Full Access
Question # 39

A web application is being developed to provide online sales to a retailer. The customers will need to use their username and passwords to login into then profile and complete their order For this reason the application must store user passwords Which approach ensures that an attacker wifi need to crack the passwords one at a time?

A.

Apply the peppering technique

B.

Store the passwords by using asymmetric encryption

C.

Apply the salting technique

D.

Store the passwords by using symmetric encryption

Full Access
Question # 40

Refer to the exhibit. A Python API server has been deployed. Based on metrics and logs, increased load has been noticed. Which two approaches must be taken to optimize API usage on the server? (Choose two.)

A.

Include the ETag header in the API response

B.

Include the Last-Modified header in the API response.

C.

Change the query to be more efficient.

D.

Include the Content-Type header in the API response.

E.

Leverage middleware caching and respond with HTTP code 204 in the API response.

Full Access
Question # 41

Refer to the exhibit.

A network engineer needs to handle API errors in their requests when users do not have permission to access the resource, even if they are authenticated and authorized. Which line of code needs to be placed on the snippet where the code is missing to handle these API errors?

A.

if r.status_code == 403

B.

il if r.raise for status() == 403

C.

if r.raise for_status() = 401

D.

if r.status_code = 401

Full Access
Question # 42

A developer in a learn of distributed authors is working on code in an isolated Git branch named 'update4a2f5464771 The developer attempts to merge the new code with a branch named ’dvcapp2a3f1564733' however the merge operation encounters a conflict error during the process. Which Git command must the developer use to exit from the merge process and return the branch to the previous state?

A.

git merge -exit

B.

git merge -abort

C.

git abort —merge

D.

git abort -status

Full Access
Question # 43

Refer to the exhibit.

An attempt to execute a CI/CD pipeline results m the error shown What is the cause of the error?

A.

The VCS repository is unavailable

B.

The unit tests failed to complete

C.

The built artifacts failed to publish to the target server

D.

The remote library repository is unavailable

Full Access
Question # 44

An application is being built to collect and display telemetry streaming data. Drag and drop the elements of this stack from the left onto the correct element functions on the right.

Full Access
Question # 45

A developer is working in a branch to develop a new feature named ‘newfeat404880077’. A file named ‘devcoreg13642911.jpg’ has accidentally been staged. This needs to be removed so that the commit is performed and branches merged. Which git command must be used to unstage the file?

A.

git delete HEAD devcoreg13642911.jpg

B.

git remove HEAD devcoreg13642911.jpg

C.

git reset HEAD devcoreg13642911.jpg

D.

git revert HEAD devcoreg13642911.jpg

Full Access
Question # 46

Drag and drop the steps on the left into the order on the right for an end-user to access an OAuth2 protected resource using the Authorization Code Grant1 flow.

Full Access
Question # 47

Click on the GET Resource button above to view resources that will help with this question.

An engineer is managing a DC with 6000 Cisco UCS servers installed and running. The engineer has been asked to identify all resources where the model is in the UCSB family and the available memory is less than or equal to 5 GB.

Which REST API call accomplishes this task?

A.

GET/api/v1/compute/RackUnits?$select=Vendor,Model,Serial&$filter=not(Model eq ‘UCSC’) and AvailableMemory le 5000

B.

GET/api/v1/compute/RackUnits?$select=Vendor,Model,Serial&$filter=Model eq ‘UCSB’ and AvailableMemory lt 5000

C.

GET/api/v1/compute/RackUnits?$select=Vendor,Model,Serial&$filter=contains(Model, UCSB’) and AvailableMemory lt 5000

D.

GET/api/v1/compute/RackUnits?$select=Vendor,Model,Serial&$filter=contains(Model, UCSB’) and AvailableMemory le 5000

Full Access
Question # 48

Refer to the exhibit.

A network engineer must integrate error handling tor time-outs on network devices using the REST interface. Which line of code needs to be placed on the snippet where the code is missing to accomplish this task?

A.

elif resp.status_code == 429 or serf._retries < selff._MAX_RETRIES:

B.

elif resp.status_code == 404 or self, retries < self._MAX_RETRIES:

C.

elif resp.status_code == 429 and self .retries < self._MAX_RETRIES:

D.

elif resp.status_code == 404 and self._relries < self._MAX_RETRIES:

Full Access
Question # 49

Which data encoding format uses gRPC by default for serializing structured sets of information?

A.

JSON

B.

YAML

C.

Protobuf

D.

XML

Full Access
Question # 50

Drag and drop the code from the bottom onto the where the code is missing to create a host object by using the Cisco Firepower Device Manager API. Not all options are used.

Full Access
Question # 51

An Etag header is included in the HTTP response for an API resource. What are two benefits of using the value of the Etag for future interactions involving the same API resource? (Choose two.)

A.

caching and optimization of response payloads

B.

creating conditional requests

C.

categorizing and comparing this API resource with others

D.

checking the integrity of the resource

E.

requesting the list of operations authorized for this resource

Full Access
Question # 52

Which two statements describe advantages of static code analysis over unit tests? (Choose two.)

A.

It checks for potential tainted data where input is not checked.

B.

It enforces proper coding standards and style.

C.

It performs a quick analysis of whether tests will pass or fail when run.

D.

It checks for race conditions in threaded applications.

E.

It estimates the performance of the code when run.

Full Access
Question # 53

Refer to the exhibit.

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 54

A developer is creating a Python function that adds network engineers to a Webex room to troubleshoot after a monitoring alert Drag and drop the code from the bottom onto the box where the code is missing in the Python function to add the engineers to the room. Not all options are used.

Full Access