Summer Special Sale - Limited Time 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 575363r9

Welcome To DumpsPedia

350-901 Sample Questions Answers

Questions 4

Refer to the exhibit.

Which action should be performed to avoid an SQL injection attack?

Options:

A.

Encrypt the password that is used to connect to the database

B.

Develop a denial of service response plan

C.

Vacate the input on the platform variable

D.

Compile the Python file instead of allowing live interpretation

Buy Now
Questions 5

Meraki Dashboard API Response

Response Status Code200

Response Link Header

<https://n6.meraki.com/api/vO/organizations/681155/devices ?perPage-3&startingAfter-

0000-0000-0000>; rel-first,

<https://n6.meraki .com/api/v0/organizations/681155/devices?perPage -3

&startingAfter-Q2EK-3UBE-RRUY>; rel-next,

<https://n6.meraki.com/api/vO/organizations/681155/devices?endingBefore -zzzz-zzzz­

zzzz&perPage-3>; rel-last Response Body

{

' name": \\II '

"serial": "Q2CV-V49B -RCMZ",

"mac": ''0c:8d:db:95:aa:39",

"networkid": "L-566327653141846927",

"model11 : "MV71",

"address": "430 E Cactus Ave .\nLas Vegas, NV 89183",

"lat": 36.00017,

"lng": -115.15302,

"notes": ''",

"tagsn: '",,

"lanip: "192.168.0.25",

' configurationUpdatedAt": "2019-08-08T02:15:36Z", ' firmware11 : "ca.rnera-3-3011

},

{

"ncune": "Alex's MR84 - 1"1

"serial": "Q2EK-2LYB-PCZP",

"mac": 'eO: 55:3d:10:56:8a", "networkid": "L 566327653141846927",

"model": "MR84",

"address": ''11 ,

"lat": 39.9482993357826,

"lng": -82.9895675461739,

"notes": "",

"tags": ' ",

"lanip: null,

"configurationVpdatedAt": "2018-02-03Tll:02:37Z",

"firmware11 : "Not running configured version''

},

{

"na.rne11 : "Vegas Living Room MR84 11 ,

"serial": "Q2EK-3UBE-RRUY",

"mac": "e0:55:3d:10:5a:ca", "networkid": "L_566327653141846927" 1

"model": "MR84",

"address": "430 E Cactus Ave.\nLas vegas, NV 89183", "lat": 36.00015,

"lng": -115.15308,

"notes": ' ",

"tags": "11

1

"lanip: "192.168.0 .20",

"configurationVpdatedAt": "2018-09-29Tl2:23:21Z",

' firmware": "Not running configured version"

Refer to the exhibit.

Which line of code must be added to this code snippet to allow an application to pull the next set of paginated items?

Options:

A.

requests.get(url, links=[‘next’][‘url’])

B.

requests.get(url, headers=links[‘next’][‘url’])

C.

requests.get(res.links[‘next’][‘url’], headers=headers)

D.

requests.get(res.headers.get(‘Link”)[‘next’][‘url’], headers=headers)

Buy Now
Questions 6

Refer to the exhibit above and click on the IETF Routing tab in the top left corner to help with this question. A developer is trying to update the routing instance by adding a new route to the routes list using the URL in the exhibit. What action must be taken to fix the error being received?

Options:

A.

Fix the body being sent to update the routes list.

B.

Update the authorization credentials.

C.

Change the url to ''/ietf-routing:routing/routing-instance=default''.

D.

Change the URL to ''/ietf-routing:routing-instance/default''.

E.

Change the HTTP Method being used to make the change

Buy Now
Questions 7

Drag and drop the code from the bottom onto the box where the code is missing to retrieve a summary of physical compute resources. The collected information about the compute resources will be presented in a dashboard to be developed for device monitoring purposes. Not all snippets are used.

Options:

Buy Now
Questions 8

Which load balancing algorithm balances load based on the active sessions of a node?

Options:

A.

weighted round-robin

B.

IP source affinity

C.

least connections

D.

sticky session

Buy Now
Questions 9

Drag and drop the code from the bottom onto the box where the code is missing to construct a UCS XML API request to generate two service profiles from the template org-root/is-service-template. Not at options are used

Options:

Buy Now
Questions 10

Refer to the exhibit.

A developer has created a Python script that retrieves information about the deployment of Cisco wireless access points using REST API. Which two code snippets must be added to the blank in the code to print the value of the userid key instead of printing the full JSON response? (Choose two.)

A)

B)

C)

D)

E)

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 11

What are two steps in the OAuth2 protocol flow? (Choose two.)

Options:

A.

The user is authenticated by the authorization server and granted an access token.

B.

The user’s original credentials are validated by the resource server and authorization is granted.

C.

The user indirectly requests authorization through the authorization server.

D.

The user requests an access token by authentication and authorization grant presentation.

E.

The user requests the protected resource from the resource server using the original credentials.

Buy Now
Questions 12

Which kind of API that is used with Cisco DNA Center provisions SSIDs, QoS policies, and update software versions on switches?

Options:

A.

Event

B.

Multivendor

C.

Integration

D.

Intent

Buy Now
Questions 13

Refer to the exhibit.

What is the missing step in deploying a Docker container to lOx?

Options:

A.

Pull/push the image to the Docker registry,

B.

Build the package.yaml file.

C.

Build the package.cert file to sign the app ,

D.

Log in to Device Manager.

Buy Now
Questions 14

What is a well-defined concept for GDPR compliance?

Options:

A.

Records that are relevant to an existing contract agreement can be retained as long as the contract is in effect.

B.

Data controllers must confirm to data subjects as to whether where, and why personal data is being processed.

C.

Personal data that was collected before the compliance standards were set do not need to be protected.

D.

Compliance standards apply to organizations that have a physical presence in Europe.

Buy Now
Questions 15

Refer to the exhibit.

An engineer needs to change the IP address via RESTCOMF on interface GigabitEthernet2. An error message is received when the script is run. Which amendment to the code will result in a successful RESTCONF action?

Options:

A.

Change POST to PATCH.

B.

Issue a DELETE before POST.

C.

Issue a DELETE before PATCH

D.

Change POST to GET

Buy Now
Questions 16

Refer to the exhibit.

A network engineer must integrate error handling tor time-outs on network devices using the REST interface. Which line of code needs to be placed on the snippet where the code is missing to accomplish this task?

Options:

A.

elif resp.status_code == 429 or serf._retries < selff._MAX_RETRIES:

B.

elif resp.status_code == 404 or self, retries < self._MAX_RETRIES:

C.

elif resp.status_code == 429 and self .retries < self._MAX_RETRIES:

D.

elif resp.status_code == 404 and self._relries < self._MAX_RETRIES:

Buy Now
Questions 17

Refer to the exhibit.

An application has been developed to serve the users in an enterprise After HTTP cache controls are implemented m the application users report that they receive state data when they refresh the page Without removing HTTP cache controls, which change ensures that the users get current data when refreshing the page'

Options:

A.

Reduce the expire_after value to 60.

B.

Add a Cache-Control header that has a value of no-cache, no-store must-revalidate.

C.

Add an H-None-Match header that has a value of an Entity Tag.

D.

Add an Expires header that has a value of 0.

Buy Now
Questions 18

Refer to the exhibit.

A developer is creating a Python script by using Cisco DNA Center APIs Drag and drop the code from the bottom onto the box where the code is missing in the Python script to retrieve and display wireless health information for each site Not all options are used.

Options:

Buy Now
Questions 19

A developer wants to automate virtual infrastructure to provision and manage it. The system will be implemented m large-scale deployment while offering redundancy and scalability with ease of management The solution must meet these requirements:

• Support the provisioning of up to 500 new virtual machines into private datacenters or the public cloud

• Support the modeling of a complex environment that consists of multiple virtual machines while supporting disaster recovery

• Maintain steady-state environments

Which configuration management solution must the developer use?

Options:

A.

Puppet

B.

Terraform

C.

Docker

D.

Arable

Buy Now
Questions 20

A local Docker container with a Container ID of 391441516e7a is running a Python application. Which

command is used to connect to a bash shell in the running container?

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 21

Refer to the exhibit. The code fetches the latest order from the purchases table for a specific user. An engineer needs to pass query parameters to the execute function to prevent an SQL injection attack. Which code snippet must be placed in the blank in the code to meet this requirement?

A)

B)

C)

D)

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 22

Refer to the exhibit above and click on the resource tabs in the top left corner to view an IETF TANG MODEL and a Python file that changes the configuration via RESTCONF. Drag and drop the code snippets from the left onto the item numbers on the right that match the missing sections in the exhibit to complete the JSON file that changes configuration of interface GigabitEthernet1 to have an IPv4 configuration of 10.10.0.1/24. Not all options are used.

Options:

Buy Now
Questions 23

Refer to the exhibit.

Drag and drop the components from the Oauth2 authorization protocol flow on the left onto the letter that matches the location in the exhibit.

Options:

Buy Now
Questions 24

What is a characteristic of event-driven architecture?

Options:

A.

separates the models for the reading and writing of data

B.

allows for loose coupling between software components

C.

breaks a solution into parts according to business capability

D.

provides a single point of reference for mastering data

Buy Now
Questions 25

{'lat': 37.4180951010362, 'lng': -122.098531723022, 'address': '', 'serial': 'Q2HP-F5K5-F98Q',

'mac': '88:15:44:ea:f5:bf', 'lanIp': '10.10.10.15',

'url': 'https://n149.meraki.com/DevNet-Sandbox/n/EFZDavc/manage/nodes/new_list/78214561218351',

'model': 'MS220-8P', 'switchProfileId': None, 'firmware': 'switch-11-31', 'floorPlanId': None}

Refer to the exhibit. A developer needs to find the geographical coordinates of a device on the network L_397561557481105433 using a Python script to query the Meraki API. After running response = requests.get() against the Meraki API, the value of response.text is shown in the exhibit.

What Python code is needed to retrieve the longitude and latitude coordinates of the device?

Options:

A.

latitude = response.text['lat']

longitude = response.text['lng']

B.

latitude = response.json()['lat']

longitude = response.json()['lng']

C.

latitude = response.json()[0]

longitude = response.json()[1]

D.

latitude = response.text[0]

longitude = response.text[1]

Buy Now
Questions 26

What are two advantages of using model-driven telemetry, such as gRPC. instead of traditional telemetry gathering methods? (Choose two.)

Options:

A.

all data is ad-hoc

B.

efficient use of bandwidth

C.

no overhead

D.

decentralized storage of telemetry

E.

continuous information with incremental updates

Buy Now
Questions 27

What are two benefits of using a centralized logging service? (Choose two.)

Options:

A.

reduces the time required to query log data across multiple hosts

B.

reduces the loss of logs after a single disk failure

C.

improves application performance by reducing CPU usage

D.

improves application performance by reducing memory usage

E.

provides compression and layout of log data

Buy Now
Questions 28

Refer to the exhibit.

A)

B)

C)

D)

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 29

Drag and drop the code from the bottom onto the box where the code is missing to configure a router that runs Cisco IOS XE by using RESTCONF. The API call is made to the management URL of the IOS XE device and on a registered port number. Errors that are caught during HTTP operation are registered. Not all options are used.

Options:

Buy Now
Questions 30

Refer to the exhibit. Which command resolves the merge conflict by removing the previous commit from the commit history?

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 31

An automated solution is needed to configure VMs in numerous cloud provider environments to connect the environments to an SDWAN. The SDWAN edge VM is provided as an image in each of the relevant clouds and can be given an identity and all required configuration via cloud-init without needing to log into the VM once online.

Which configuration management and/or automation tooling is needed for this solution?

Options:

A.

Ansible

B.

Ansible and Terraform

C.

NSO

D.

Terraform

E.

Ansible and NSO

Buy Now
Questions 32

Refer to the exhibit.

An application is created to serve an enterprise Based on use and department requirements, changes are requested quarterly Which application design change improves code maintainability?

Options:

A.

Use global variables

B.

Use double quotes instead of single quotes to enclose variables

C.

Use different indent levels for variables

D.

Use more verbose names for variables

Buy Now
Questions 33

Refer to the exhibit.

Which code snippet must be added to the blank in the code to automate the evaluation and handling of errors due to wrong credentials when Basic Authorization is used?

A)

B)

C)

D)

Options:

A.

Option

B.

Option

C.

Option

D.

Option

Buy Now
Questions 34

Where should distributed load balancing occur in a horizontally scalable architecture?

Options:

A.

firewall-side/policy load balancing

B.

network-side/central load balancing

C.

service-side/remote load balancing

D.

client-side/local load balancing

Buy Now
Questions 35

Refer to the exhibit.

Which type of python dependency file is shown?

Options:

A.

setup.py

B.

TOML

C.

packages

D.

requirements.txt

Buy Now
Questions 36

When an application is designed that requires high availability, what is a reason to use a cross-region cloud?

Options:

A.

Provide disaster recovery protection

B.

Protect from a single component failure

C.

Minimize costs

D.

Account for failure in another zone

Buy Now
Questions 37

Refer to the exhibit.

A Python script must list network clients in the Cisco Meraki API that have used a network with an ID of 2 The number of client entries per returned page is restricted to 1.000 according to the API specification Network 2 has 2.500 clients What must be added where the code is missing to print the content of each response?

A)

B)

C)

D)

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 38

Refer to the exhibit. The presented application consists of a Nginx container and a load balancer service. Which GitLab CI/CD configuration implements the Kubernetes deployment?

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 39

Refer to the exhibit. Drag and drop the code snippets from the left onto the item numbers on the right that match the missing sections in the curl exhibit to complete the cURL request to FirePower Device Manager API to create objects. Not all code snippets are used.

Options:

Buy Now
Questions 40

FILL BLANK

Fill in the blanks to complete the Python script to enable the SSID with a name of “371767916” in the network resource “11111111” using the Meraki Dashboard API.

Options:

Buy Now
Questions 41

Refer to the exhibit.

A developer is creating a Python script to use the Webex Teams REST API to list joined spaces, retry after the server-specified amount of time if a “Too many requests” response is received, and print any other error that is received. Drag and drop the code snippets from the left onto the item numbers on the right that match the missing sections in the exhibit to complete the script. Not all code snippets are used.

Options:

Buy Now
Questions 42

How should logs for an application be created?

Options:

A.

Use a standard and easily configurable logging framework.

B.

Use fault-tolerant protocols.

C.

Monitor for backlogs and outages.

D.

Filter sensitive data before transmitting logs.

Buy Now
Questions 43

Drag and Drop the application requirement on the left onto the database type that should be selected for the requirement on the right.

Options:

Buy Now
Questions 44

A developer deploys a web application in a local data center that is now experiencing high traffic load from users accessing data through REST API calls. Which approach enhances the responsiveness and performance of the API?

Options:

A.

Use HTTP POST or other non-read methods for read requests when possible

B.

Ensure that all read requests are clearly identified by the PUT method

C.

Configure API payload to return errors in HTTP 200 responses

D.

Use HTTP standard authorization header to submit authentication credentials

Buy Now
Questions 45

Which security approach should be used for developing a REST API?

Options:

A.

Use custom security relevant HTTP response codes

B.

Utilise TLS for end to end encryption

C.

Add an API key to each URL string

D.

Utilize CORS headers

Buy Now
Questions 46

A developer must deploy a containerized application foe network device inventory management. The developer sets up a Kubernetes duster on two separate hypervisors. The SLA is not currently meeting a specified maximum value for network latencyjitter CPU/memory and disk I/O are functioning property. Which two design approaches resolve the issue'' (Choose two.)

Options:

A.

Colocate services in the same pod

B.

Replace the HDD drives with SSD drives

C.

Enable IPv6 within the duster

D.

Deploy the duster to a bare metal server

E.

Upgrade the server NIC card

Buy Now
Questions 47

Drag and drop the code from the bottom onto the box where the code is missing in the Python script to execute a REST API call to query all the NTP policy names and print the name of each policy. Not all options are used.

Options:

Buy Now
Questions 48

What is the gRPC Network Management Interface protocol?

Options:

A.

a unified management protocol for streaming telemetry and database logging

B.

a configuration management protocol for monitoring

C.

a protocol for configuration management and streaming telemetry

D.

a logging protocol used across database servers

Buy Now
Questions 49

Which two data encoding techniques are supported by gRPC? (Choose two.)

Options:

A.

XML

B.

JSON

C.

ASCII

D.

ProtoBuf

E.

YAML

Buy Now
Questions 50

Which command is used 10 enable application hosting on a Cisco IOS XE device?

Options:

A.

iox

B.

iox-service

C.

application -honing

D.

app- hosting

Buy Now
Questions 51

Refer to the exhibit.

Drag and drop the correct parts of the Dockerfile from the left onto the item numbers on the right that match the missing sections in the exhibit to complete the Dockerfile to successfully build and deploy a container running a Python application. Not all parts of the Dockerfile are used.

Options:

Buy Now
Questions 52

A developer has built a Docker image named 'devcor73f3e94529V using the Dockerfile named 'devcor42f5e464771‘ and now needs to containerize it. Which command must the developer use?

Options:

A.

docker run -name devcor73f3e945291 -i -t devcorapp

B.

docker run -name devcorapp i -t devcor73f3e945291

C.

docker build --name devcorapp -i devcor73f3e945291

D.

docker build -name devcor73f3e945291 -i devcorapp

Buy Now
Questions 53

Refer to the exhibit.

A network engineer writes a script to test authentication workflow using Python and REST API. The engineer wants to ensure that the script handles expected errors by matching output to HTTP status codes The scnpt uses the Python requests module. Which line of code must be added on the snippet where the code is missing?

Options:

A.

requests.error_code

B.

response.sutus_code

C.

response

D.

requests.post

Buy Now
Questions 54

Refer of the exhibit.

Click on the resource labs in the top left corner to view resources to help with this question The script uses the Cisco Intersight REST API Drag and drop the code from the bottom of the code snippet to the blanks in the code to construct a Python script to update the firmware on a specific Cisco interaght managed UCS rack server, DMZ-RL3ADJM.

Options:

Buy Now
Questions 55

A Cisco Catalyst 9000 switch has guest shell enabled. Which Linux command installs a third-party application?

Options:

A.

yum Install

B.

apt-get install

C.

zypper install

D.

dnf install

Buy Now
Questions 56

Which database type should be used to store data received from model-driven telemetry?

Options:

A.

BigQuery database

B.

Time series database

C.

NoSQL database

D.

PostgreSQL database

Buy Now
Questions 57

A developer releases a new application for network automation of Cisco devices deployed m a local data center. The application utilizes complex design patterns such as microservices that host multiple third-party libraries and programming languages. The development must be simplified by implementing an observability-driven development lifecycle. Which two considerations must be taken to meet the requirements? (Choose two.)

Options:

A.

description of low-level errors

B.

which KPls to monitor

C.

relevant metrics to expose

D.

which monitoring tools to use

E.

identifying customer priorities

Buy Now
Questions 58

Which function does Fluentd fulfill for application logging in Kubernetes?

Options:

A.

logging agent for distribution

B.

backend time series database storage

C.

monitoring and log visualization

D.

messaging queueig infrastructure

Buy Now
Questions 59

A developer in a learn of distributed authors is working on code in an isolated Git branch named 'update4a2f5464771 The developer attempts to merge the new code with a branch named ’dvcapp2a3f1564733' however the merge operation encounters a conflict error during the process. Which Git command must the developer use to exit from the merge process and return the branch to the previous state?

Options:

A.

git merge -exit

B.

git merge -abort

C.

git abort —merge

D.

git abort -status

Buy Now
Questions 60

What is the function of dependency management?

Options:

A.

separating code into modules that execute independently

B.

utilizing a single programming language/framework for each code project

C.

automating the identification and resolution of code dependencies

D.

managing and enforcing unique software version names or numbers

Buy Now
Questions 61

Refer to the exhibit.

An engineer needs to implement REST API error handling when a timeout or rate limit scenario is present. Which code snippet must be placed into the blank in the code to complete the API request?

A)

B)

C)

D)

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 62

Click on the Meraki Resources tab in the left corner to view Meraki documentation to help with this question.Drag and drop the parts of the python code from the left onto the item numbers on the right that match the missing sections in the exhibit to enable an SSID. Not all code parts are used.

Options:

Buy Now
Questions 63

A developer is working in a branch to develop a new feature named ‘newfeat404880077’. A file named ‘devcoreg13642911.jpg’ has accidentally been staged. This needs to be removed so that the commit is performed and branches merged. Which git command must be used to unstage the file?

Options:

A.

git delete HEAD devcoreg13642911.jpg

B.

git remove HEAD devcoreg13642911.jpg

C.

git reset HEAD devcoreg13642911.jpg

D.

git revert HEAD devcoreg13642911.jpg

Buy Now
Questions 64

Drag and drop the code from the bottom onto the box where the code is missing on the Dockerfile to containerize an application that listens on the specified TCP network port at runtime. Not all options are used.

Options:

Buy Now
Questions 65

A team of developers created their own CA and started signing certificates for all of their loT devices, Which action will make the browser

accept these certificates?

Options:

A.

Set the private keys 1024-bit RSA.

B.

Preload the developer CA on the trusted CA list of the browser.

C.

Enable HTTPS or port 443 on the browser.

D.

install a TLS instead of SSL certificate on the loT devices.

Buy Now
Questions 66

Refer to the exhibit Pipenv is used to manage dependencies The test funs successfully on a local environment. What is the reason for the error when running the test on a CI'CD pipeline?

Options:

A.

The piple in the local environment was not pushed to the remote repository

B.

All the unit tests in testsum py failed

C.

Pytest did not detect any functions that start with test_'.

D.

Nose2 was not used as the test runner

Buy Now
Questions 67

Refer to the exhibit.

One part of an application routinely uses the Cisco Meraki API to collate data about all clients Other parts of the application also use the Meraki API, but a single API key is used within the application The organization has approximately 4.000 clients across 30 networks Some of the application users report poor performance and missing data. Which two changes improve the performance of the application? (Choose two.)

Options:

A.

Check for HTTP code 429 and wait until Retry-After time before further calls are made

B.

Configure multiple API keys in the application and rotate usage of each one.

C.

Use random values in the User-Agent header when HTTP calls are made.

D.

Use fewer API calls to create a more efficient endpoint.

E.

Check API response payloads for later reuse in real time during code execution.

Buy Now
Questions 68

An application has been developed for monitoring rooms in Cisco Webex. An engineer uses the application to

retrieve all the messages from a Cisco Webex room, but the results are slowly presented. Which action

optimizes calls to retrieve the messages from the /v1/messages endpoint?

Options:

A.

Define the ma property by using the pagination functionality.

B.

Set the beforeMessage property to retrieve the messages sent before a specific message ID.

C.

Avoid unnecessary calls by using a prior request to /v1/rooms to retrieve the last activity property.

D.

Filter the response results by specifying the created property in the request.

Buy Now
Questions 69

Refer to the exhibit.

The YAML represented is using the ios_vrf module. As part of the Ansible playbook workflow, what is the result when this task is run?

Options:

A.

VRFs not defined in the host_vars file are removed from the device.

B.

VRFs not defined in the host_vars file are added to the device, and any other VRFs on the device remain.

C.

VRFs defined in the host_vars file are removed from the device.

D.

VRFs are added to the device from the host_vars file, and any other VRFs on the device are removed.

Buy Now
Questions 70

Refer to the exhibit.

A Python developer is creating a wireless network device inventory application for local deployment of Cisco access points The developer is retrieving an access point ID by using a REST API The output indicates that there was a KeyError when parsing the JSON response. What returns the expected output of 266 at line 14?

A)

B)

C)

D)

Options:

A.

Option

B.

Option

C.

Option

D.

Option

Buy Now
Questions 71

An application requires SSL certificates signed by an intermediate CA certificate. The crt files must be available to the application:

• The root CA certificate is root_certrficate.crt.

• The intermediate CA certificate is intermediate_certificate.crt

• The application-specific SSL certificate is crt_certificate.crt.

Which Bash command outputs the certificate bundle as a .pern file?

A)

B)

C)

D)

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 72

Click on the GET Resource button above to view resources that will help with this question. An engineer is managing a DC with 6000 Cisco UCS servers installed and running. The engineer has been asked to identify all resources where the model is in the UCSB family and the available memory is less than or equal to 5 GB. Which REST API call accomplishes this task?

Options:

A.

GET/api/v1/compute/RackUnits?$select=Vendor,Model,Serial&$filter=not(Model eq ‘UCSC’) and AvailableMemory le 5000

B.

GET/api/v1/compute/RackUnits?$select=Vendor,Model,Serial&$filter=Model eq ‘UCSB’ and AvailableMemory lt 5000

C.

GET/api/v1/compute/RackUnits?$select=Vendor,Model,Serial&$filter=contains(Model, UCSB’) and AvailableMemory lt 5000

D.

GET/api/v1/compute/RackUnits?$select=Vendor,Model,Serial&$filter=contains(Model, UCSB’) and AvailableMemory le 5000

Buy Now
Questions 73

Application sometimes store configuration as constants in the code, which is a violation of strict separation of configuration from code. Where should application configuration be stored?

Options:

A.

environment variables

B.

YAML files

C.

Python libraries

D.

Dockerfiles

E.

INI files

Buy Now
Questions 74

Which OAuth mechanism enables clients to continue to have an active access token without further interaction from the user?

Options:

A.

JWT

B.

password grant

C.

refresh grant

D.

preshared key

Buy Now
Questions 75

A developer is designing a modem, distributed microservice enterprise application. The application will be integrating with other systems and focus on a large deployment, so control of API calls is necessary. What is the best practice to reduce application response latency and protect the application from excessive use?

Options:

A.

Implement rate limiting on the client side.

B.

Implement rate limiting on the client and server sides.

C.

Do not enforce any rate Imiting

D.

Implement rate limiting on the server side.

Buy Now
Questions 76

Which Puppet manifest changes the NTP server and generates the traffic from VLAN 15?

A)

B)

C)

D)

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 77

Refer to the exhibit.

A Docker swarm cluster is configured to load balance services across data centers in three different geographical regions west central and east. The cluster has three manager nodes and three worker nodes Anew service named cisco.devnet is being deployed. The service has these design requirements

• All containers must be hosted only on nodes in the central region

• The service must run only on nodes that are ineligible for the manager role

Which approach fulfills the requirements?

Options:

A.

Create a second swarm cluster that is hosted only in the central region.

B.

Create the service manually in the central region and set replicas to 0.

C.

Use placement constraints to control nodes to which the service can be assigned.

D.

Enable the control flag in the containers of the west and east regions to prevent the service from starting

Buy Now
Questions 78

Refer to the exhibit. A Python API server has been deployed. Based on metrics and logs, increased load has been noticed. Which two approaches must be taken to optimize API usage on the server? (Choose two.)

Options:

A.

Include the ETag header in the API response

B.

Include the Last-Modified header in the API response.

C.

Change the query to be more efficient.

D.

Include the Content-Type header in the API response.

E.

Leverage middleware caching and respond with HTTP code 204 in the API response.

Buy Now
Questions 79

A developer plans to create a new bugfix branch to fix a bug that was found on the release branch. Which command completes the task?

Options:

A.

git checkout -b RELEASE BUGFIX

B.

git checkout -t BUGF1X RELEASE

C.

git checkout -b BUG FIX RELEASE

D.

git checkout -t RELEASE BUGFIX

Buy Now
Questions 80

Refer to the exhibit.

Which AP! call does an engineer use to delete the FQDN object?

Options:

A.

DELETE /api/fmc_config/v1/domain/e276abec-e0f2-11e3-8169-6d9ed49b625f

B.

DELETE /api/fmc_config/v1/domain/e276abec-e0f2-11e3-8169-6d9ed49b625f/object/fqdns/005056BB-0B24-0ed3-0000-858993545263

C.

DELETE /api/fmc_config/v1/domain?id=e276abec-e0f2-11e3-8169-6d9ed49b625f

D.

DELETE /api/fmc_config/v1/domain/e276abec-e0f2-11e3-8169-6d9ed49b625f/object/fqdns?id=005056BB-0B24-0ed3-0000-858993545263

Buy Now
Questions 81

A web application has those requirements for HTTP cache control:

  • The client browser must be prevented from storing responses that contain sensitive information.
  • Assets must be downloaded from the remote server every time.

Which header must the engineer use?

Options:

A.

must-revabdate

B.

no-store

C.

public

D.

private

Buy Now
Questions 82

An application uses OAuth to get access to several API resources on behalf of an end user. What are two valid parameters to send to the authorization server as part of the first step of an authorization code grant flow? (Choose two.)

Options:

A.

URI to which the authorization server will send the user-agent back when access is granted or denied

B.

list of the API resources that the application is requesting to access

C.

secret that was generated by the authorization server when the application registered as an OAuth integration

D.

list of scopes that correspond to the API resources to which the application is requesting to access

E.

name of the application under which the application registered as an OAuth integration

Buy Now
Questions 83

Refer to the exhibit.

The cURL POST request creates an OAuth access token for authentication with FDM API requests. What is the purpose of the file “@token_data” that cURL is handling?

Options:

A.

This file is a container to log possible error responses in the request.

B.

This file is given as input to store the access token received from FDM.

C.

This file is used to send authentication related headers.

D.

This file contains raw data that is needed for token authentication.

Buy Now
Questions 84

Drag and drop the code from the bottom onto the box where the code is missing to enable an SSID by using the Cisco Meraki Dashboard API. Not all options are used.

Options:

Buy Now
Questions 85

Refer to the exhibit.

Which cURL request is included in the presented XML as the body of the response?

A)

B)

C)

D)

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 86

A developer is working on a bug fix. The existing branch named ‘bugfix05328’ needs to be merged with the current working primary branch named ‘prim404880077’. All changes must be integrated into a single commit instead of preserving them as individual commits. Which git command must be used?

Options:

A.

git checkout – –squash bugfix05328

B.

git merge – –squash bugfix05328

C.

git rebase – –merge bugfix05328

D.

git push – –rebase bugfix05328

Buy Now
Questions 87

Refer to the exhibit. Which action resolves the error for the GitLab CI/CD pipeline execution?

Options:

A.

Download the correct artifacts by specifying them in GitLab.

B.

Use the python:3.9.0a4-alpine3.10 Docker image

C.

Install the missing python libraries via pip3.

D.

Add the absolute path to the python3 executable

Buy Now
Questions 88

An engineer needs to configure an interface named GigabitEthernet3 with an IP address on several RESTCONF-enabled Cisco IOS XE devices. Which code snippet must be placed in the blank in the code to meet this requirement?

Options:

A.

(item["name"])'

B.

(item["name"])/ip/addres3

C.

item["name"]:/ip/address/primary'

D.

(ltemt"name"]} /ip

Buy Now
Questions 89

Into which two areas are AppDynamics APIs categorized? (Choose two.)

Options:

A.

application-centric

B.

analytics-events

C.

database-visibility

D.

platform-side

E.

agent-side

Buy Now
Questions 90

Refer to the exhibit.

Which URL retrieves the errors in the GigabitEthernet 1 interface?

A)

B)

C)

D)

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 91

Refer to the exhibit.

Which two functions are performed by the load balancer when it handles traffic originating from the Internet destined to an application hosted on the file server farm? (Choose two.)

Options:

A.

Terminate the TLS over the UDP connection from the router and originate an HTTPS connection to the selected server.

B.

Terminate the TLS over the UDP connection from the router and originate an HTTP connection to the selected server.

C.

Terminate the TLS over the TCP connection from the router and originate an HTTP connection to the selected server.

D.

Terminate the TLS over the TCP connection from the router and originate an HTTPS connection to the selected server.

E.

Terminate the TLS over the SCTP connection from the router and originate an HTTPS connection to the selected server.

Buy Now
Questions 92

How is client code that consumes gRPC telemetry implemented, assuming that the preferred language is able to be chosen?

Options:

A.

Parse the OpenAPI spec model

B.

Compile the protocol buffers IDL

C.

Leverage a Thrift code generator to parse a Thrift IDL

D.

Review the Swagger API documentation to build client code

Buy Now
Questions 93

Drag and drop the git commands from the left into the correct order on the right to create a feature branch from the master and then incorporate that feature branch into the master.

Options:

Buy Now
Questions 94

Refer to the exhibit.

An engineer is implementing the response for unrecoverable REST API errors. Which message needs to be placed on the snippet where the code is missing to complete the print statement?

Options:

A.

"Error; The server is unable to handle your request." "Error:

B.

The data requested has not been found."

C.

"Error: The rate limit has been exceeded for sending API requests at this time"

D.

"Enor: The server requires authentication to complete this request."

Buy Now
Questions 95

Cisco sensorBase gathers threat information from a variety of cisco products and services and performs analytics on threats. Which term describes this process?

Options:

A.

consumption

B.

deployment

C.

sharing

D.

authoring

Buy Now
Questions 96

A web application is being developed to provide online sales to a retailer. The customers will need to use their username and passwords to login into then profile and complete their order For this reason the application must store user passwords Which approach ensures that an attacker wifi need to crack the passwords one at a time?

Options:

A.

Apply the peppering technique

B.

Store the passwords by using asymmetric encryption

C.

Apply the salting technique

D.

Store the passwords by using symmetric encryption

Buy Now
Questions 97

Refer to the exhibit.

A network engineer developed an Ansible playbook and committed it to GitLab. A GitLab CI pipeline is started but immediately fails. What is the issue?

Options:

A.

The runner task uses an incorrect parameter.

B.

The Ansible playbook task has a formatting issue.

C.

The Ansible playbook has an undefined variable.

D.

The runner is running the wrong Docker version.

Buy Now
Questions 98

A custom dashboard of the network health must be created by using Cisco DNA Center APIs An existing dashboard is a RESTful API that receives data from Cisco DNA Center as a new metric every time the network health information is sent from the script to the dashboard Which set of requests creates the custom dashboard?

Options:

A.

PUT request to Cisco DNA Center to obtain the network health information and then a POST request to the dashboard to publish the new metric

B.

POST request to Cisco DNA Center to obtain the network health information and then a GET request to the dashboard to publish the new metric

C.

GET request to Cisco DNA Center to obtain the network health information and then a PUT request to the dashboard to publish the new metric

D.

GET request to Cisco DNA Center to obtain the network health information and then a POST request to the dashboard to publish the new metric

Buy Now
Questions 99

Refer to the exhibit.

Drag and drop the code from the bottom onto the box where the code is missing to complete the API request. An engineer is using this API request to implement Chat-Ops to generate notifications m a Webex space by using webhooks. Not all options are used.

Options:

Buy Now
Questions 100

Refer to the exhibit.

Python threading allows a developer to have different parts of a program run concurrently and simplify a design. Drag and drop the code snippets from the left onto the item numbers on the right that match the missing sections in the exhibit to create a thread instance.

Options:

Buy Now
Questions 101

A development team is looking for a tool to automate configurations across the infrastructure. The tool must have these characteristics:

•written in Python

•define playbooks (or intent

•stateless

•imperative

Which tool meets these requirements?

Options:

A.

Puppet

B.

Netmiko

C.

Ansible

D.

NCM

Buy Now
Questions 102

What is a consideration for using gRPC as the model-driven telemetry protocol on a Cisco IOS XE device?

Options:

A.

XML-based transmission format

B.

works in dial-out mode

C.

human-readable transmission format

D.

works in call-out mode

Buy Now
Questions 103

There is a requirement to securely store unique usernames and passwords. Given a valid username, it is also required to validate that the password provided is correct. Which action accomplishes this task?

Options:

A.

Encrypt the username, hash the password, and store these values.

B.

Hash the username, hash the password, and store these values.

C.

Encrypt the username, encrypt the password, and store these values.

D.

Hash the username, encrypt the password, and store these values.

Buy Now
Questions 104

Which two types of storage are supported for app hosting on a Cisco Catalyst 9000 Series Switch? (Choose two.)

Options:

A.

external USB storage

B.

internal SSD

C.

CD-ROM

D.

SD-card

E.

bootflash

Buy Now
Questions 105

A developer is creating a Python script to catch errors using REST API calls and to aid in debugging. Drag and drop the code from the bottom onto the box where the code is missing to implement control flow for REST API errors. Not all options are used.

Options:

Buy Now
Questions 106

Click on the GET Resource button above to view resources that will help with this question.

An engineer is managing a DC with 6000 Cisco UCS servers installed and running. The engineer has been asked to identify all resources where the model is in the UCSB family and the available memory is less than or equal to 5 GB.

Which REST API call accomplishes this task?

Options:

A.

GET/api/v1/compute/RackUnits?$select=Vendor,Model,Serial&$filter=not(Model eq ‘UCSC’) and AvailableMemory le 5000

B.

GET/api/v1/compute/RackUnits?$select=Vendor,Model,Serial&$filter=Model eq ‘UCSB’ and AvailableMemory lt 5000

C.

GET/api/v1/compute/RackUnits?$select=Vendor,Model,Serial&$filter=contains(Model, UCSB’) and AvailableMemory lt 5000

D.

GET/api/v1/compute/RackUnits?$select=Vendor,Model,Serial&$filter=contains(Model, UCSB’) and AvailableMemory le 5000

Buy Now
Questions 107

Drag and drop the code from the bottom onto the box where the code is missing in the diagram to show how data is processed in Webex Teams. Not all options are used.

Options:

Buy Now
Questions 108

How does the use of release packaging allow dependencies to be effectively managed during deployments?

Options:

A.

dependencies are staggered between multiple releases

B.

designed to prevent any dependencies between release units

C.

dependencies are tested after the release is deployed

D.

removal of release units if they have issues in testing

Buy Now
Exam Code: 350-901
Exam Name: Developing Applications using Cisco Core Platforms and APIs (DEVCOR)
Last Update: Jul 31, 2025
Questions: 363
$70  $174.99
$54  $134.99
$46  $114.99
buy now 350-901