Labour Day Sale - Limited Time 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 575363r9

Welcome To DumpsPedia

350-901 Sample Questions Answers

Questions 4

Click on the resource lab in the top left comer to view resources to help with this question An engineer is managing a data center with 6000 Cisco UCS servers installed and running The engineer is asked to identify all resources where the model is in the UCSB family and the available memory is less than or equal to 5 GB Drag and drop the code from the bottom onto the blanks in the code snippet to construct a REST API call to accomplish this task Not all options are used.

Options:

Buy Now
Questions 5

Refer to the exhibit Pipenv is used to manage dependencies The test funs successfully on a local environment. What is the reason for the error when running the test on a CI'CD pipeline?

Options:

A.

The piple in the local environment was not pushed to the remote repository

B.

All the unit tests in testsum py failed

C.

Pytest did not detect any functions that start with test_'.

D.

Nose2 was not used as the test runner

Buy Now
Questions 6

An engineer needs to automate the configuration on a Cisco NX-OS switch. The solution must meet these requirements:

•Ansible is used

•The transport protocol is encrypted

•Support for Asynchronous requests.

Which two access mechanisms must be used? (Choose two.)

Options:

A.

SNMP Version 2c

B.

NETCONF

C.

NX-API

D.

HTTPS

E.

JSON-RPC

Buy Now
Questions 7

Refer to the exhibit.

A Python developer is creating a wireless network device inventory application for local deployment of Cisco access points The developer is retrieving an access point ID by using a REST API The output indicates that there was a KeyError when parsing the JSON response. What returns the expected output of 266 at line 14?

A)

B)

C)

D)

Options:

A.

Option

B.

Option

C.

Option

D.

Option

Buy Now
Questions 8

A user is receiving a 429 Too Many Requests error. Which scheme is the server employing that causes this error?

Options:

A.

rate limiting

B.

time outs

C.

caching

D.

redirection

Buy Now
Questions 9

An engineer is developing a Docket container for an application in Python For security reasons the application needs to be accessible on port 5001 only Which line should be added to the dockerfile m order to accomplish this?

Options:

A.

ENTRYPOINT 5001

B.

PORT SRC 5001

C.

ADO PORT 5001

D.

EXPOSE 5001

Buy Now
Questions 10

Refer to the exhibit.

A)

B)

C)

D)

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 11

Refer to the exhibit.

Cisco IOS XE switches are used across the entire network and the description that is filed for all interfaces must be configured. Which code snippet must be placed in the blank in the script to leverage RESTCONF to query all the devices in the device list for the interfaces that are present?

A)

B)

C)

D)

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 12

Refer to the exhibit. Which action resolves the error for the GitLab CI/CD pipeline execution?

Options:

A.

Download the correct artifacts by specifying them in GitLab.

B.

Use the python:3.9.0a4-alpine3.10 Docker image

C.

Install the missing python libraries via pip3.

D.

Add the absolute path to the python3 executable

Buy Now
Questions 13

Refer to the exhibit , The command docker build -tag=friendlyhello . is run to build a docker image from the given Dockerfile,

requirements,txt, and app.py, Then the command docker run -p 4000:80 friendlyhello is executed to run the application. Which URL is entered in the web browser to see the content served by the application?

Options:

B.

http ://localhost:80

C.

http ://127.0.0.1:80

Buy Now
Questions 14

Refer to the exhibit above and click on the resource tabs in the top left corner to view resources to help with this question. The script uses the Cisco Intersight REST API. Drag and drop the code snippets from the left onto the item numbers on the right to match the missing sections in the Python script to update the firmware on specific Cisco Intersight USC rack server.DMZ_R-L3-ADJM. Not all code snippets are used.

Options:

Buy Now
Questions 15

An engineer needs to configure an interface named GigabitEthernet3 with an IP address on several RESTCONF-enabled Cisco IOS XE devices. Which code snippet must be placed in the blank in the code to meet this requirement?

Options:

A.

(item["name"])'

B.

(item["name"])/ip/addres3

C.

item["name"]:/ip/address/primary'

D.

(ltemt"name"]} /ip

Buy Now
Questions 16

Drag and drop the code from the bottom onto the box where the code is missing to enable an SSID by using the Cisco Meraki Dashboard API. Not all options are used.

Options:

Buy Now
Questions 17

Refer to the exhibit.

Drag and drop the code snippets from the left onto the item numbers on the right that match the missing sections in the exhibit to complete the script to implement control flow.

Options:

Buy Now
Questions 18

Which database type should be used to store data received from model-driven telemetry?

Options:

A.

BigQuery database

B.

Time series database

C.

NoSQL database

D.

PostgreSQL database

Buy Now
Questions 19

Refer to the exhibit.

Drag and drop the code from the bottom onto the box where the code is missing to complete the API request. An engineer is using this API request to implement Chat-Ops to generate notifications m a Webex space by using webhooks. Not all options are used.

Options:

Buy Now
Questions 20

Which load balancing algorithm balances load based on the active sessions of a node?

Options:

A.

weighted round-robin

B.

IP source affinity

C.

least connections

D.

sticky session

Buy Now
Questions 21

An application is developed in order to communicate with Cisco Webex. For reporting, the application must retrieve all the messages sent to a Cisco Webex room on a monthly basis.

Which action calls /v1/messages directly?

Options:

A.

Set up a webhook that has messages as the resource type and store the results locally.

B.

Utilize the pagination functionality by defining the max property.

C.

Recursively call the /vl/messages endpoint by using the beforeMessage property.

D.

Filter the response results by specifying the created property in the request.

Buy Now
Questions 22

How should a web application be designed to work on a platform where up to 1000 requests per second can be served?

Options:

A.

Use algorithms like random early detection to deny excessive requests.

B.

Set a per-user limit (for example, 5 requests/minute/user) and deny the requests from the users who have reached the limit.

C.

Only 1000 user connections are allowed; further connections are denied so that all connected users can be served.

D.

All requests are saved and processed one by one so that all users can be served eventually.

Buy Now
Questions 23

Click on the Meraki Resources tab in the left corner to view Meraki documentation to help with this question.Drag and drop the parts of the python code from the left onto the item numbers on the right that match the missing sections in the exhibit to enable an SSID. Not all code parts are used.

Options:

Buy Now
Questions 24

An engineer must enable an SSID in a Meraki network. Which request accomplishes this task?

Options:

A.

PUT /networks/{networkld}/ssids/{number} {"enable": true)

B.

POST /networks/{networkid}/ssids/{number) {"enable": true)

C.

PUT /networks/{networkld}/ssids/{number}?enabled=true

D.

POST /networks/{networkid}/sslds/{number}?enabled=true

Buy Now
Questions 25

A cloud native project is being worked on in which all source code and dependencies are written in Python, Ruby, and/or JavaScipt. A change in code triggers a notification to the CI/CD tool to run the CI/CD pipeline.

Which step should be omitted from the pipeline?

Options:

A.

Deploy the code to one or more environments, such as staging and/or production.

B.

Build one of more containers that package up code and all its dependencies.

C.

Compile code.

D.

Run automated tests to validate the correctness.

Buy Now
Questions 26

Which command is used to enable application hosting on a Cisco IOS XE device?

Options:

A.

app-hosting

B.

application-hosting

C.

iox

D.

iox-service

Buy Now
Questions 27

Which Git command enables the developer to revert back to f414f31 commit to discard changes in the current working tree?

Options:

A.

git reset-hard f414f31

B.

git reset checkout-hard f414f31

C.

git reset-soft f414f31

D.

git checkout f414f31

Buy Now
Questions 28

Drag and drop the code from the bottom onto the box where the code is missing to retrieve and display wireless network hearth information. The wireless network devices are being managed by Cisco DNA Center and are compatible with REST API Not all options are used.

Options:

Buy Now
Questions 29

Drag and drop the code from the bottom onto the box where the code is missing to construct a contact tracking application that dynamically returns all the Bluetooth clients on a given Meraki network. Not all options are used.

Options:

Buy Now
Questions 30

Refer to the exhibit.

Drag and drop the code snippets from the left onto the item numbers on the right that match the missing sections in the cURL exhibit to complete the cURL request to FirePower Device Manager API to create objects. Not all code snippets are used.

Options:

Buy Now
Questions 31

A developer needs to configure an environment to orchestrate and configure. Which two tools should be used for each task? (Choose two.)

Options:

A.

Puppet for orchestration

B.

Terraform for orchestration

C.

Terraform for configuration

D.

Ansible for orchestration

E.

Ansible for configuration

Buy Now
Questions 32

Which kind of API that is used with Cisco DNA Center provisions SSIDs, QoS policies, and update software versions on switches?

Options:

A.

Event

B.

Multivendor

C.

Integration

D.

Intent

Buy Now
Questions 33

What are two steps in the OAuth2 protocol flow? (Choose two.)

Options:

A.

The user is authenticated by the authorization server and granted an access token.

B.

The user’s original credentials are validated by the resource server and authorization is granted.

C.

The user indirectly requests authorization through the authorization server.

D.

The user requests an access token by authentication and authorization grant presentation.

E.

The user requests the protected resource from the resource server using the original credentials.

Buy Now
Questions 34

Which database type should be used with highly structured data and provides support for ACID transactions?

Options:

A.

time series

B.

document

C.

graph

D.

relational

Buy Now
Questions 35

Drag and drop the operations from the left into the order on the right to create a web dashboard that displays Cisco DNA Center data for an organization.

Options:

Buy Now
Questions 36

Refer to the exhibit. Drag and drop the code snippets from the bottom onto the blanks in the code to provision a new UCS server. Not all options are used.

Options:

Buy Now
Questions 37

Refer to the exhibit.

What is the output of this IOS-XE configuration program?

Options:

A.

interface operational status in IPv6 addresses

B.

interface administrative status in IPv4 addresses

C.

interface operational status in IPv4 addresses

D.

interface administrative status in IPv6 addresses

Buy Now
Questions 38

Refer to the exhibit.

An application has been developed to serve the users in an enterprise After HTTP cache controls are implemented m the application users report that they receive state data when they refresh the page Without removing HTTP cache controls, which change ensures that the users get current data when refreshing the page'

Options:

A.

Reduce the expire_after value to 60.

B.

Add a Cache-Control header that has a value of no-cache, no-store must-revalidate.

C.

Add an H-None-Match header that has a value of an Entity Tag.

D.

Add an Expires header that has a value of 0.

Buy Now
Questions 39

What is an effective logging strategy according 10 the 12-factor app tenets?

Options:

A.

Capture togs by the execution environment and route to a centralized destination

B.

Tag and save togs in a local document database that has querying capabilities.

C.

Back up log files in a high-availability remote cluster on the public cloud

D.

Timestamp and save logs in a local time-series database that has querying capabilities

Buy Now
Questions 40

Refer to the exhibit.

A network engineer developed an Ansible playbook and committed it to GitLab. A GitLab CI pipeline is started but immediately fails. What is the issue?

Options:

A.

The runner task uses an incorrect parameter.

B.

The Ansible playbook task has a formatting issue.

C.

The Ansible playbook has an undefined variable.

D.

The runner is running the wrong Docker version.

Buy Now
Questions 41

What is a well-defined concept of GDPR compliance?

Options:

A.

Data subjects can require that the data controller erase their personal data.

B.

Records that are relevant to an existing contract agreement can be retained as long as the contract is in effect.

C.

Personal data that was collected before the compliance standards were set do not need to be protected

D.

Compliance standards appry to organizations that have a physical presence in Europe

Buy Now
Questions 42

Drag and drop the components from the left into the order on the right to create the flow of the three-legged OAuth2.

Options:

Buy Now
Questions 43

Drag and drop the code from the bottom onto the box where the code is missing in the Ansible script to get the existing firewall rules from Cisco Meraki and store the results to a new variable. Not all options are used.

Options:

Buy Now
Questions 44

A team of developers created their own CA and started signing certificates for all of their loT devices, Which action will make the browser

accept these certificates?

Options:

A.

Set the private keys 1024-bit RSA.

B.

Preload the developer CA on the trusted CA list of the browser.

C.

Enable HTTPS or port 443 on the browser.

D.

install a TLS instead of SSL certificate on the loT devices.

Buy Now
Questions 45

A developer is building an application to access a website. When running the application, an HTTP 403 error

code has been received. How should the application be modified to handle this code?

Options:

A.

Create a loop on cancel the operation and run a new one after the code is received.

B.

Use exponential backoff when retrying distributed services and other remote endpoints.

C.

Build a try/except around the urlopen to find errors occurring in the request.

D.

Redirect the request to an internal web server and make a new request from the internal resource.

Buy Now
Questions 46

An application has initiated an OAuth authorization code grant flow to get access to an API resource on behalf of an end user.

Which two parameters are specified in the HTTP request coming back to the application as the end user grants access? (Choose two.)

Options:

A.

access token and a refresh token with respective expiration times to access the API resource

B.

access token and expiration time to access the API resource

C.

redirect URI a panel that shows the list of permissions to grant

D.

code that can be exchanged for an access token

E.

state can be used for correlation and security checks

Buy Now
Questions 47

Drag and drop the REST API authentication method from the left to the description on the right

Options:

Buy Now
Questions 48

Refer to the exhibit.

Many faults have occurred in the ACI environment and a sample of them needs to be examined. Which API call retrieves faults 30 through 45?

Buy Now
Questions 49

Which tool is used to deploy an IOx application to a group of lOx devices at one time?

Options:

A.

ioxclient

B.

lOx local manager

C.

Fog Network Director

D.

Kubernetes

Buy Now
Questions 50

A developer creates an application for a Cisco Catalyst 9000 switch in a Docker container. Which action must be taken to host the application on the switch?

Options:

A.

Copy the application code to a NETCONF file and upload the file to the switch

B.

Connect the switch to Cisco DNA Center and push the application through the platform.

C.

Use the Cisco IOxClient tool to export the application to a ZIP file and push the file to the switch

D.

Export the application as a TAR file and import the file to the switch

Buy Now
Questions 51

Refer to the exhibit.

A developer must review an intern's code for a script they wrote to automate backups to the storage server. The script must connect to the network device and copy the running-config to the server. When considering maintainability, which two changes must be made to the code? (Choose two.)

Options:

A.

Rename the class to "ArchiveManager".

B.

The code is incorrect because the class does not have an__init__() method.

C.

The command sent to the network device is incorrect.

D.

Refactor the code placing the "for" loop steps inside a single nc method.

E.

The intern must use IP addresses because DNS is unreliable.

Buy Now
Questions 52

Refer to the exhibit.

What is the missing step in deploying a Docker container to lOx?

Options:

A.

Pull/push the image to the Docker registry,

B.

Build the package.yaml file.

C.

Build the package.cert file to sign the app ,

D.

Log in to Device Manager.

Buy Now
Questions 53

Drag and drop the code from the bottom onto the box where the code is missing in the diagram to show how data is processed in Webex Teams. Not all options are used.

Options:

Buy Now
Questions 54

What is a characteristic of event-driven architecture?

Options:

A.

separates the models for the reading and writing of data

B.

allows for loose coupling between software components

C.

breaks a solution into parts according to business capability

D.

provides a single point of reference for mastering data

Buy Now
Exam Code: 350-901
Exam Name: Developing Applications using Cisco Core Platforms and APIs (DEVCOR)
Last Update: Apr 24, 2024
Questions: 363
$68  $169.99
$52  $129.99
$44  $109.99
buy now 350-901