Cisco Certified DevNet Professional 350-901 DEVCOR Online Free Questions

The Developing Applications Using Cisco Core Platforms and APIs v1.0 (DEVCOR 350-901) exam is a 120-minute exam associated with the Cisco Certified DevNet Professional certification. PassQuestion new released 350-901 DEVCOR exam questions to help you pass your exam easily. You can practice in the following Cisco Certified DevNet Professional 350-901 DEVCOR Online Free Questions.

1. A developer has created an application based on customer requirements. The customer needs to run the application with the minimum downtime.

Which design approach regarding high-availability applications, Recovery Time Objective, and Recovery Point Objective must be taken?

 
 
 
 

2. A cloud native project is being worked on in which all source code and dependencies are written in Python, Ruby, and/or JavaScnpt. A change in code triggers a notification to the CI/CD tool to run the CI/CD pipeline.

Which step should be omitted from the pipeline?

 
 
 
 

3. Which two statements are considered best practices according to the 12-factor app methodology for application design? (Choose two.)

 
 
 
 
 

4. An organization manages a large cloud-deployed application that employs a microservices architecture. No notable issues occur with downtime because the services of this application are redundantly deployed over three or more data center regions.

However, several times a week reports are received about application slowness. The container orchestration logs show faults in a variety of containers that cause them to fail and then spin up brand new.

Which action must be taken to improve the resiliency design of the application while maintaining current scale?

 
 
 
 

5. How should a web application be designed to work on a platform where up to 1000 requests per second can be served?

 
 
 
 

6. An organization manages a large cloud-deployed application that employs a microservices architecture across multiple data centers. Reports have received about application slowness. The container orchestration logs show that faults have been raised in a variety of containers that caused them to fail and then spin up brand new instances.

Which two actions can improve the design of the application to identify the faults? (Choose two.)

 
 
 
 
 

7. Which two situations are flagged by software tools designed for dependency checking in continuous integration environments, such as OWASP? (Choose two.)

 
 
 
 
 

8. A network operations team is using the cloud to automate some of their managed customer and branch locations. They require that all of their tooling be ephemeral by design and that the entire automation environment can be recreated without manual commands. Automation code and configuration state will be stored in git for change control and versioning. The engineering high-level plan is to use VMs in a cloud-provider environment then configure open source tooling onto these VMs to poll, test, and configure the remote devices, as well as deploy the tooling itself.

Which configuration management and/or automation tooling is needed for this solution?

 
 
 
 
 

9. An application is hosted on Google Kubernetes Engine. A new JavaScript module is created to work with the existing application.

Which task is mandatory to make the code ready to deploy?

 
 
 
 

10. Which database type should be used with highly structured data and provides support for ACID transactions?

 
 
 
 

11. Which two strategies are used to protect personally identifiable information? (Choose two.)

 
 
 
 
 

12. Refer to the exhibit.

As part of the Ansible playbook workflow, several new interfaces are being configured using the netconf_config module. The task references the interface variables that are unique per device.

In which directory is the YAML file with these variables found?

 
 
 
 

13. Which two techniques protect against injection attacks? (Choose two.)

 
 
 
 
 

14. DRAG DROP

Refer to the exhibit.

The self-service Webex Teams bot is failing when many users attempt to interact with it at the same time.

Drag and drop the code snippets from the left onto the correct item numbers on the right that match the missing sections in the exhibit to complete this code to handle this high-load situation.

15. DRAG DROP

Refer to the exhibit.

Drag and drop the parts of the Python code from the left onto the item numbers on the right that match the missing sections in the exhibit that consumes REST API pagination.

16. Refer to the exhibit.

Which snippet creates a Webex Teams space and adds the users in the variable user list to that space?

A)

B)

C)

D)

 
 
 
 

17. Refer to the exhibit , The command docker build -tag=friendlyhello . is run to build a docker image from the given Dockerfile, requirements,txt, and app.py, Then the command docker run -p 4000:80 friendlyhello is executed to run the application.

Which URL is entered in the web browser to see the content served by the application?

 
 
 
 

18. Refer to the exhibit.

This script uses ciscoyang to configure two VRF instances on a Cisco IOS-XR device using the Yang NETCONF type.

Which two words are required to complete the script? (Choose two.)

 
 
 
 
 

19. DRAG DROP

Refer to the exhibit.

Drag and drop parts of the URL from the left onto the item numbers on the right that match the missing sections in the exhibit to create the appropriate RESTCONF URL to query the VLAN configuration given this YANG model. Not all URL parts are used.

20. Refer to the exhibit.

Which additional line results in the output of Test 1 upon execution of the docker run –rm devnet 1 command in a Dockerfile with this content?

 
 
 
 

21. Refer to the exhibit.

Which set of API requests must be executed by a Webex Teams bot after receiving a webhook callback to process messages in a room and reply with a new message back to the same room?

A)

B)

C)

D)

 
 
 
 

22. DRAG DROP

Drag and drop the code from the bottom onto the box where the code is missing the snippet to complete this Ansible Playbook. Not all options are used.

23. Refer to the exhibit.

An engineer needs to change the IP address via RESTCOMF on interface GigabitEthernet2. An error message is received when the script is run.

Which amendment to the code will result in a successful RESTCONF action?

 
 
 
 

24. A developer has completed the implementation of a REST API, but when it is executed, it returns a 401 error message.

What must be done on the API to resolve the issue?

 
 
 
 

25. In the three-legged OAuth2 authorization workflow, which entity grants access to a protected resource?

 
 
 
 

26. A developer needs to configure an environment to orchestrate and configure.

Which two tools should be used for each task? (Choose two.)

 
 
 
 
 

27. Why is end-to-end encryption deployed when exposing sensitive data through APIs?

 
 
 
 

28. Users report that they are no longer able to process transactions with the online ordering application, and the logging dashboard is displaying these messages:

Fri Jan 10 19:37:31.123 ESI 2020 [FRONTEND] [NFO: Incoming request to add item to cart from user 45834534858

Fri Jan 10 19:37:31.247 EST 2020 [BACKEND] INFO: Attempting to add item to cart

Fri Jan 10 19:37:31.250 EST 2020 [BACKEND] ERROR: Failed to add item: MYSQLDB ERROR: Connection refused

What is causing the problem seen in these log messages?

 
 
 
 

29. Refer to the exhibit.

An Intersight API is being used to query RackUnit resources that have a tag keyword set to “Site”.

What is the expected output of this command?

 
 
 
 

30. Which two statements are considered best practices according to the 12-factor app methodology for application design? (Choose two.)

 
 
 
 
 

31. Refer to the exhibit.

Many faults have occurred in the ACI environment and a sample of them needs to be examined.

Which API call retrieves faults 30 through 45?

 
 
 
 

32. Which two data encoding techniques are supported by gRPC? (Choose two.)

 
 
 
 
 

33. An Etag header is included in the HTTP response for an API resource.

What are two benefits of using the value of the Etag for future interactions involving the same API resource? (Choose two.)

 
 
 
 
 

34. User report that they can no longer process transactions with the online ordering application, and the logging dashboard is displaying these messages.

Fri Jan 10 19:37:31.123 EST 2020 [FRONTEND] INFO: Incoming request to add item to cart from user 45834534858

Fri Jan 10 19:37:31 247 EST 2020 [BACKEND] INFO: Attempting to add item to cart

Fri Jan 10 19:37:31 250 EST 2020 [BACKEND] ERROR: Failed to add item: MYSQLDB

ERROR: Connection refused

What is causing the problem seen in these log messages?

 
 
 
 

35. An engineer must enable an SSID in a Meraki network.

Which request accomplishes this task?

 
 
 
 

36. An automated solution is needed to configure VMs in numerous cloud provider environments to connect the environments to an SDWAN. The SDWAN edge VM is provided as an image in each of the relevant clouds and can be given an identity and all required configuration via cloud-init without needing to log into the VM once online.

Which configuration management and/or automation tooling is needed for this solution?

 
 
 
 
 

37. The UCS Python SDK includes modules for Service Profile template creation.

Which two UCS Service Profile template types are supported? (Choose two.)

 
 
 
 
 

38. An application has initiated an OAuth authorization code grant flow to get access to an API resource on behalf of an end user.

Which two parameters are specified in the HTTP request coming back to the application as the end user grants access? (Choose two.)

 
 
 
 
 

39. The response from a server includes the header ETag: W/”7eb8b94419e371767916ef13e0d6e63d”.

Which statement is true?

 
 
 
 

40. Click on the GET Resource button above to view resources that will help with this question. An engineer is managing a DC with 6000 Cisco UCS servers installed and running. The engineer has been asked to identify all resources where the model is in the UCSB family and the available memory is less than or equal to 5 GB.

Which REST API call accomplishes this task?

 
 
 
 

41. DRAG DROP

Refer to the exhibit above and click on the resource tabs in the top left corner to view an IETF TANG MODEL and a Python file that changes the configuration via RESTCONF.

Drag and drop the code snippets from the left onto the item numbers on the right that match the missing sections in the exhibit to complete the JSON file that changes configuration of interface GigabitEthernet1 to have an IPv4 configuration of 10.10.0.1/24. Not all options are used.

42. DRAG DROP

Refer to the exhibit above and click on the tab in the top left corner to view a diagram that describes the typical flow of requests involved when a webhook is created for a booking service.

Drag and drop the requests from the left onto the item numbers on the right that match the missing sections in the sequence diagram to design the complete flow of requests involved as a booking is updated from a web application.

43. Which transport protocol is used by gNMI?

 
 
 
 

44. Refer to the exhibit.

Which RESTCONF verb changes the GigabitEthernet2 interface from 192.168.100.1/24 to 10.10.10.1/24

 
 
 
 

45. An organization manages a large cloud-deployed application that employs a microservices architecture across multiple data centers. Reports have received about application slowness. The container orchestration logs show that faults have been raised in a variety of containers that caused them to fail and then spin up brand new instances.

Which two actions can improve the design of the application to identify the faults? (Choose two.)

 
 
 
 
 

46. Refer to the exhibit.

Which line of code must be added to this code snippet to allow an application to pull the next set of paginated items?

 
 
 
 

47. DRAG DROP

Drag and drop the steps on the left into the order on the right for an end-user to access an OAuth2 protected resource using the Authorization Code Grant1 flow.

48. DRAG DROP

Refer to the exhibit.

Drag and drop the code snippets from the left onto the item numbers on the right that match the missing sections in the cURL exhibit to complete the cURL request to FirePower Device Manager API to create objects. Not all code snippets are used.

49. Refer to the exhibit.

A kubeconfig file to manage access to clusters is provided.

How many clusters are defined and which of them are accessed using username/password authentication versus certificate?

 
 
 
 

50. DRAG DROP

Refer to the exhibit.

A developer is creating a Python script to use the Webex Teams REST API to list joined spaces, retry after the server-specified amount of time if a “Too many requests” response is received, and print any other error that is received.

Drag and drop the code snippets from the left onto the item numbers on the right that match the missing sections in the exhibit to complete the script. Not all code snippets are used.

51. A web application is susceptible to cross-site scripting.

Which two methods allow this issue to be mitigated? (Choose two.)

 
 
 
 
 

52. A cloud native project is being worked on in which all source code and dependencies are written in Python, Ruby, and/or JavaScipt. A change in code triggers a notification to the CI/CD tool to run the CI/CD pipeline.

Which step should be omitted from the pipeline?

 
 
 
 

53. DRAG DROP

Refer to the exhibit above and click on the resource tabs in the top left corner to view resources to help with this question.

A developer is creating a Python Script that will use the Webex Teams REST API to automatically create a new collaboration space with him and his team leads on-demand via a Linux terminal command.

Drag and drop the code snippets from the left onto the numbers on the right that match the missing sections in the exhibit to complete the script. Not all code snippets are used.

54. DRAG DROP

Drag and drop the steps from the left into the correct sequence on the right to describe how to use Git to maintain the current HEAD and revert back to a previous commit, while undoing all intermediate commits.

55. DRAG DROP

Drag and drop the characteristics from the left onto the correct data processing techniques on the right, in the context of GDPR.


700-680 Free Questions - Cisco Collaboration SaaS Authorization (CSaaS) Exam
300-615 DCIT Exam Questions Online - Troubleshooting Cisco Data Center Infrastructure

Leave a Reply

Your email address will not be published. Required fields are marked *