Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: cramtreat

350-901 Developing Applications using Cisco Core Platforms and APIs (DEVCOR) Questions and Answers

Questions 4

Refer to the exhibit.

A)

B)

C)

D)

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 5

What is the function of dependency management?

Options:

A.

separating code into modules that execute independently

B.

utilizing a single programming language/framework for each code project

C.

automating the identification and resolution of code dependencies

D.

managing and enforcing unique software version names or numbers

Buy Now
Questions 6

Refer to the exhibit.

A Python script must list network clients in the Cisco Meraki API that have used a network with an ID of 2 The number of client entries per returned page is restricted to 1.000 according to the API specification Network 2 has 2.500 clients What must be added where the code is missing to print the content of each response?

A)

B)

C)

D)

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 7

Drag and drop the code onto the snippet to update a SSID in Meraki using the Dashboard API. Not all options are used.

Options:

Buy Now
Questions 8

An automated solution is needed to configure VMs in numerous cloud provider environments to connect the environments to an SDWAN. The SDWAN edge VM is provided as an image in each of the relevant clouds and can be given an identity and all required configuration via cloud-init without needing to log into the VM once online.

Which configuration management and/or automation tooling is needed for this solution?

Options:

A.

Ansible

B.

Ansible and Terraform

C.

NSO

D.

Terraform

E.

Ansible and NSO

Buy Now
Questions 9

Which two countermeasures help reduce the risk of playback attacks? (Choose two.)

Options:

A.

Store data in a NoSQL database.

B.

Implement message authentication (HMAC).

C.

Enable end-to-end encryption.

D.

Remove stack traces from errors.

E.

Use short-lived access tokens.

Buy Now
Questions 10

A developer releases a new application for network automation of Cisco devices deployed m a local data center. The application utilizes complex design patterns such as microservices that host multiple third-party libraries and programming languages. The development must be simplified by implementing an observability-driven development lifecycle. Which two considerations must be taken to meet the requirements? (Choose two.)

Options:

A.

description of low-level errors

B.

which KPls to monitor

C.

relevant metrics to expose

D.

which monitoring tools to use

E.

identifying customer priorities

Buy Now
Questions 11

The response from a server includes the header ETag: W/”7eb8b94419e371767916ef13e0d6e63d”. Which statement is true?

Options:

A.

The ETag has a Strong validator directive.

B.

The ETag has a Weak validator directive, which is an optional directive.

C.

The ETag has a Weak validator directive, which is a mandatory directive.

D.

The ETag has a Strong validator directive, which it is incorrectly formatted.

Buy Now
Questions 12

Refer to the exhibit.

A developer created a Python script to retrieve interface information for the devices in a MeraKi network environment. A security analyst has reviewed the code and observed poor secret storage practices. What is the appropriate password storage approach?

Options:

A.

Set the Base64 encoded version of the API key as MER_API_KEY in the code and Base64 decode before using in the header.

B.

Set an OS environment variable for MER_API_KEY to the API key during running the code and longer set MER_API_KEY within the code.

C.

Create a secret for the API key, set MER_API_KEY using the value from the secret in the Pod. and no longer set MER_API_KEY within the code.

D.

Leverage an external secret vault to retrieve MER_API_KEY and embed the vault key as a new variable before running the code.

Buy Now
Questions 13

Which command is used to enable application hosting on a Cisco IOS XE device?

Options:

A.

app-hosting

B.

application-hosting

C.

iox

D.

iox-service

Buy Now
Questions 14

A developer in a learn of distributed authors is working on code in an isolated Git branch named 'update4a2f5464771 The developer attempts to merge the new code with a branch named ’dvcapp2a3f1564733' however the merge operation encounters a conflict error during the process. Which Git command must the developer use to exit from the merge process and return the branch to the previous state?

Options:

A.

git merge -exit

B.

git merge -abort

C.

git abort —merge

D.

git abort -status

Buy Now
Questions 15

Refer to the exhibit.

Two editors are concurrently updating an article’s headline from their mobile devices. What results from this scenario based on this REST API sequence?

Options:

A.

The article is marked as “Conflicted”

B.

The article headline is “Monday Headlines”

C.

The article headline is “Today Headlines”

D.

The article headline is “Top Headlines”

Buy Now
Questions 16

Refer to the exhibit.

Which set of API requests must be executed by a Webex Teams bot after receiving a webhook callback to process messages in a room and reply with a new message back to the same room?

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 17

An application is developed in order to communicate with Cisco Webex. For reporting, the application must retrieve all the messages sent to a Cisco Webex room on a monthly basis.

Which action calls /v1/messages directly?

Options:

A.

Set up a webhook that has messages as the resource type and store the results locally.

B.

Utilize the pagination functionality by defining the max property.

C.

Recursively call the /vl/messages endpoint by using the beforeMessage property.

D.

Filter the response results by specifying the created property in the request.

Buy Now
Questions 18

Refer to the exhibit. Which snippet creates a Webex Teams space and adds the users in the variable user list to that space?

A)

B)

C)

D)

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 19

How should logs for an application be created?

Options:

A.

Use a standard and easily configurable logging framework.

B.

Use fault-tolerant protocols.

C.

Monitor for backlogs and outages.

D.

Filter sensitive data before transmitting logs.

Buy Now
Questions 20

A new record-keeping application for employees to track customer orders must be deployed to a company's existing infrastructure. The host servers reside in a data center in a different country to where the majority of users work. The new network configuration for the database server is: •IP: 10.8.32.10

• Subnet Mask: 255.255.255.0

• Hostname: CustOrd423320458-Prod-010

• MAC: 18-46-AC-6F-F4-52.

The performance of the client-side application is a priority due to the high demand placed on it by employees. Which area should the team consider in terms of impact to application performance due to the planned deployment?

Options:

A.

jitter

B.

decreased bandwidth

C.

latency

D.

connectivity loss

Buy Now
Questions 21

A developer deploys a web application in a local data center that is now experiencing high traffic load from users accessing data through REST API calls. Which approach enhances the responsiveness and performance of the API?

Options:

A.

Use HTTP POST or other non-read methods for read requests when possible

B.

Ensure that all read requests are clearly identified by the PUT method

C.

Configure API payload to return errors in HTTP 200 responses

D.

Use HTTP standard authorization header to submit authentication credentials

Buy Now
Questions 22

Refer to the exhibit

An application is developed to perform multiple API calls. The calls will be performed on the infrastructure devices Delays in the information transfer occur when the application is executed What are two reasons for the issue? (Choose two )

Options:

A.

The list devices API call is failing and does not return a result

B.

Listing devices lakes longer than usual due to high network latency

C.

One of the API calls takes roughly three times as long to complete

D.

The list devices API call is inefficient and should be refactored

E.

The requests are being rate limited to prevent multiple calls causing the excessive load

Buy Now
Questions 23

Refer to the exhibit.

Drag and drop the steps from the left into the order of operation on the right for a successful OAuth2 three-legged authorization code grant flow,

Options:

Buy Now
Questions 24

A developer is deploying an application to automate the configuration and management of Osco network files and routers The application must use REST API interface lo achieve programmability. The security team mandates that the network must be protected against DDoS attacks What mitigates the attacks without impacting genuine requests?

Options:

A.

API rate limiting at the application layer

B.

IP address filtering at the application layer

C.

traffic routing on the network perimeter

D.

firewall on the network perimeter

Buy Now
Questions 25

A container running a Python script is failing when it reaches the integration testing phase of the CI/CD process. The code has been reviewed thoroughly and the build process works on this container and all other containers pass unit and integration testing.

What should be verified to resolve the issue?

Options:

A.

that the correct port is exposed in the Dockerfile

B.

that the necessary modules and packages are installed on build

C.

that the script is running from the right directory

D.

that the Python version of the container image is correct

Buy Now
Questions 26

A developer must deploy a containerized application foe network device inventory management. The developer sets up a Kubernetes duster on two separate hypervisors. The SLA is not currently meeting a specified maximum value for network latencyjitter CPU/memory and disk I/O are functioning property. Which two design approaches resolve the issue'' (Choose two.)

Options:

A.

Colocate services in the same pod

B.

Replace the HDD drives with SSD drives

C.

Enable IPv6 within the duster

D.

Deploy the duster to a bare metal server

E.

Upgrade the server NIC card

Buy Now
Questions 27

A cloud native project is being worked on in which all source code and dependencies are written in Python, Ruby, and/or JavaScipt. A change in code triggers a notification to the CI/CD tool to run the CI/CD pipeline.

Which step should be omitted from the pipeline?

Options:

A.

Deploy the code to one or more environments, such as staging and/or production.

B.

Build one of more containers that package up code and all its dependencies.

C.

Compile code.

D.

Run automated tests to validate the correctness.

Buy Now
Questions 28

Which two gRPC modes of model-driven telemetry are supported on Cisco IOS XE Software? (Choose two.)

Options:

A.

dial-in

B.

dial-out

C.

call-in

D.

call-out

E.

passive

Buy Now
Questions 29

A developer IS deploying an action to automate the configuration and management of Cisco network switches and routers. The application must use REST API interlace to achieve programmability. The security team mandates that the network must be protected against DDoS attacks. What mitigates the attacks without impacting genuine requests?

Options:

A.

traffic routing on the network perimeter

B.

firewall on the network perimeter

C.

API rate limiting at the application layer

D.

IP address filtering at the application layer

Buy Now
Questions 30

A developer needs to configure an environment to orchestrate and configure. Which two tools should be used for each task? (Choose two.)

Options:

A.

Puppet for orchestration

B.

Terraform for orchestration

C.

Terraform for configuration

D.

Ansible for orchestration

E.

Ansible for configuration

Buy Now
Questions 31

Refer to the exhibit.

Which RESTCONF verb changes the GigabitEthernet2 interface from 192.168.100.1/24 to 10.10.10.1/24

Options:

A.

POST

B.

PATCH

C.

GET

D.

HEAD

Buy Now
Questions 32

Which OAuth mechanism enables clients to continue to have an active access token without further interaction from the user?

Options:

A.

JWT

B.

password grant

C.

refresh grant

D.

preshared key

Buy Now
Questions 33

A bot has been created, called "386231131”, to respond to alarm messages. A developer is now creating a Webhook to allow the bot to respond to messages. Which format allows the Webhook to respond to messages for the bot within Webex Teams?

A)

B)

C)

D)

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 34

Refer to the exhibit above and click on the IETF Routing tab in the top left corner to help with this question. A developer is trying to update the routing instance by adding a new route to the routes list using the URL in the exhibit. What action must be taken to fix the error being received?

Options:

A.

Fix the body being sent to update the routes list.

B.

Update the authorization credentials.

C.

Change the url to ''/ietf-routing:routing/routing-instance=default''.

D.

Change the URL to ''/ietf-routing:routing-instance/default''.

E.

Change the HTTP Method being used to make the change

Buy Now
Questions 35

Refer to the exhibit.

A developer runs the docker service scale command to increase the number of replicas for the cisco_devnet service. The swarm cluster is using a private IP address subnet. The service has these design requirements:

  • It must be hosted behind a virtual IP address that is reachable from the Internet.
  • For security reasons, the Docker swarm cluster subnet must not be reachable from the Internet.

Which design approach is used to fulfill the requirements?

Options:

A.

Create an overlay network by using a globally roulable subnet and enable a routing mesh within the swarm cluster.

B.

Create a bridge network by using a globally routable subnet and enable a routing mesh within the swarm cluster.

C.

Configure an external load balancer to route requests to the swarm service by using VPN.

D.

Configure an external load balancer to route requests to the swarm service by using NAT.

Buy Now
Questions 36

Drag and drop the code from the bottom onto the box where the code is missing to create a new Cisco Webex space and attach a previously configured bot named 'sampleBot'. Not all options are used.

Options:

Buy Now
Questions 37

An application uses OAuth to get access to several API resources on behalf of an end user. What are two valid parameters to send to the authorization server as part of the first step of an authorization code grant flow? (Choose two.)

Options:

A.

URI to which the authorization server will send the user-agent back when access is granted or denied

B.

list of the API resources that the application is requesting to access

C.

secret that was generated by the authorization server when the application registered as an OAuth integration

D.

list of scopes that correspond to the API resources to which the application is requesting to access

E.

name of the application under which the application registered as an OAuth integration

Buy Now
Questions 38

Refer to the exhibit.

Which additional line results in the output of Test 1 upon execution of the docker run --rm devnet 1 command in a Dockerfile with this content?

Options:

A.

CMD [“/bin/echo”, “Test”]

B.

RUN [“/bin/echo”, “Test”]

C.

ENTRYPOINT [“/bin/echo”, “Test”]

D.

CMD [“/bin/echo Test”]

Buy Now
Questions 39

Drag and drop the code snippets from the bottom onto the boxes where the code is missing to deploy three Cisco UCS servers each from a different template Not all options ate used.

Options:

Buy Now
Questions 40

Refer to the exhibit Drag and drop the code snippets from the left onto the item numbers on the right that match the missing sections in the exhibit to complete the script to implement control flow.

Options:

Buy Now
Questions 41

What is the gRPC Network Management Interface protocol?

Options:

A.

a unified management protocol for streaming telemetry and database logging

B.

a configuration management protocol for monitoring

C.

a protocol for configuration management and streaming telemetry

D.

a logging protocol used across database servers

Buy Now
Questions 42

Refer to the exhibit.

An application is created to serve an enterprise Based on use and department requirements, changes are requested quarterly Which application design change improves code maintainability?

Options:

A.

Use global variables

B.

Use double quotes instead of single quotes to enclose variables

C.

Use different indent levels for variables

D.

Use more verbose names for variables

Buy Now
Questions 43

Refer to the exhibit.

Recently, users have reported problems logging into an application with their usernames and passwords. The logs have captured an authentication attempt. Based on the messages and errors contained, what is the cause of the problem?

Options:

A.

The sign-in redirection is sending clients to the wrong server for SSO.

B.

There is a time synchronization issue between the application and LDAP.

C.

Users are providing incorrect credentials when logging in.

D.

The LDAP server used for authentication fails to respond to connection requests

Buy Now
Questions 44

Refer to the exhibit.

Which type of python dependency file is shown?

Options:

A.

setup.py

B.

TOML

C.

packages

D.

requirements.txt

Buy Now
Questions 45

An engineer needs to configure an interface named GigabitEthernet3 with an IP address on several RESTCONF-enabled Cisco IOS XE devices. Which code snippet must be placed in the blank in the code to meet this requirement?

Options:

A.

(item["name"])'

B.

(item["name"])/ip/addres3

C.

item["name"]:/ip/address/primary'

D.

(ltemt"name"]} /ip

Buy Now
Questions 46

Which two types of organization are subject to GDPR? (Choose two.)

Options:

A.

only organizations that operate outside the EU

B.

any organization that offers goods or services to customers in the EU

C.

only organizations that have offices in countries that are part of the EU

D.

any organization that operates within the EU

E.

only organizations that physically reside in the EU

Buy Now
Questions 47

A developer plans to create a new bugfix branch to fix a bug that was found on the release branch. Which command completes the task?

Options:

A.

git checkout -b RELEASE BUGFIX

B.

git checkout -t BUGF1X RELEASE

C.

git checkout -b BUG FIX RELEASE

D.

git checkout -t RELEASE BUGFIX

Buy Now
Questions 48

In the three-legged OAuth2 process, after the authorization server presents a form to the resource owner to grant access, what is the next step?

Options:

A.

The resource owner authenticates and optionally authorizes with the authorization server.

B.

The user who owns the resource initiates a request to the OAuth client.

C.

If the resource owner allows access, the authorization server sends the OAuth client a redirection.

D.

A form to allow or restrict access is submitted by the owner of the resource.

Buy Now
Questions 49

Refer to the exhibit. Which URI string retrieves configured static routes in a VRF named CUSTOMER from a RESTCONF-enabled device?

A)

B)

C)

D)

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 50

Drag and drop the steps from the left into the order on the right to create the workflow to retrieve the gateway information from a set of Cisco IOS devices. Not all options are used.

Options:

Buy Now
Questions 51

Click on the GET Resource button above to view resources that will help with this question. An engineer is managing a DC with 6000 Cisco UCS servers installed and running. The engineer has been asked to identify all resources where the model is in the UCSB family and the available memory is less than or equal to 5 GB. Which REST API call accomplishes this task?

Options:

A.

GET/api/v1/compute/RackUnits?$select=Vendor,Model,Serial&$filter=not(Model eq ‘UCSC’) and AvailableMemory le 5000

B.

GET/api/v1/compute/RackUnits?$select=Vendor,Model,Serial&$filter=Model eq ‘UCSB’ and AvailableMemory lt 5000

C.

GET/api/v1/compute/RackUnits?$select=Vendor,Model,Serial&$filter=contains(Model, UCSB’) and AvailableMemory lt 5000

D.

GET/api/v1/compute/RackUnits?$select=Vendor,Model,Serial&$filter=contains(Model, UCSB’) and AvailableMemory le 5000

Buy Now
Questions 52

A team is developing a cloud-native application for network monitoring and management of various devices. An increased growth rate of users is expected. The solution must be easily managed and meet these requirements:

•able to use dependencies

•easy disposability

•flexible configuration

Which application design approach must be used?

Options:

A.

waterfall model

B.

12-factor app framework

C.

object-oriented programming

D.

agile software development

Buy Now
Questions 53

Which HTTP status code indicates that a client application is experiencing intentional rate limiting by the server?

Options:

A.

202

B.

401

C.

429

D.

503

Buy Now
Questions 54

Refer to the exhibit.

An engineer needs to implement REST API error handling when a timeout or rate limit scenario is present. Which code snippet must be placed into the blank in the code to complete the API request?

A)

B)

C)

D)

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Exam Code: 350-901
Exam Name: Developing Applications using Cisco Core Platforms and APIs (DEVCOR)
Last Update: Jun 15, 2025
Questions: 363
350-901 pdf

350-901 PDF

$33.25  $94.99
350-901 Engine

350-901 Testing Engine

$38.5  $109.99
350-901 PDF + Engine

350-901 PDF + Testing Engine

$50.75  $144.99