Spring Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: buysanta

Exact2Pass Menu

Developing Applications using Cisco Core Platforms and APIs (DEVCOR)

Last Update 1 hour ago Total Questions : 434

The Developing Applications using Cisco Core Platforms and APIs (DEVCOR) content is now fully updated, with all current exam questions added 1 hour ago. Deciding to include 350-901 practice exam questions in your study plan goes far beyond basic test preparation.

You'll find that our 350-901 exam questions frequently feature detailed scenarios and practical problem-solving exercises that directly mirror industry challenges. Engaging with these 350-901 sample sets allows you to effectively manage your time and pace yourself, giving you the ability to finish any Developing Applications using Cisco Core Platforms and APIs (DEVCOR) practice test comfortably within the allotted time.

Question # 21

Drag and drop the code snippets from the bottom onto the blanks in the code to create a configuration backup on a Cisco UCS server using the Cisco UCS Python SDK. Some options may be used more than once. Not all options are used.

Question # 22

What is the function of dependency management?

A.

separating code into modules that execute independently

B.

utilizing a single programming language/framework for each code project

C.

automating the identification and resolution of code dependencies

D.

managing and enforcing unique software version names or numbers

Question # 23

Drag and drop the code from the bottom onto the box where the code is missing on the Ansible task to enable a VLAN on a Meraki MX Device, Not all options are used.

Question # 24

A bot has been created, called " 386231131”, to respond to alarm messages. A developer is now creating a Webhook to allow the bot to respond to messages. Which format allows the Webhook to respond to messages for the bot within Webex Teams?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question # 25

An application has these characteristics

• provide one service or function

• distributed database

• API gateway

• central repository for code

• configuration database

• uses session management

Which two design approaches contribute to the scalability of the application? (Choose two.)

A.

built to scale based on a star topology

B.

modular design iteration

C.

session management in a stateless architecture

D.

planned before the first device is deployed

E.

distributed computing with tightly coupled components

Question # 26

Refer to the exhibit.

The application follows a containerized microservices architecture that has one container per microservice. The microservices communicate with each other by using REST APIs The double-headed arrows m the diagram display chains of synchronous HTTP calls needed for a single use/request Which action ensures the resilience of the application in the scope of a single user request?

A.

Redesign the application to be separated into these three layers Presentation. API. and Data

B.

Implement retries with exponential backoff during HTTP API calls

C.

Set up multiple instances of each microservice m active/active mode by using the Orchestrator

D.

Create two virtual machines that each host an instance of the application and set up a cluster

Question # 27

What is a risk to data privacy during the storage and transmission of data?

A.

The risk of exposure is increased when data is shared between applications.

B.

The transfer of unencrypted data between storage devices increases the risk of exposure.

C.

Data breaches cause ongoing exposure of personal information.

D.

The transfer of unencrypted personally identifiable financial information from a storage device increases the risk of a data broach.

Question # 28

An application uses OAuth to get access to several API resources on behalf of an end user. What are two valid parameters to send to the authorization server as part of the first step of an authorization code grant flow? (Choose two.)

A.

URI to which the authorization server will send the user-agent back when access is granted or denied

B.

list of the API resources that the application is requesting to access

C.

secret that was generated by the authorization server when the application registered as an OAuth integration

D.

list of scopes that correspond to the API resources to which the application is requesting to access

E.

name of the application under which the application registered as an OAuth integration

Question # 29

Refer to the exhibit.

An engineer creates an application that leverages the Ansible framework to provision CPE endpoints that have configuration changes. The application contains an Ansible playbook named provision_cpes.yml that uses the ansible.builtin.script Ansible module to execute these two Python scripts:

• gather and_create.py. which creates a JSON file named bios.json that contains the CPE models and their respective IOS file information

• load and parse.py. which loads the file data and parses it for later consumption

After several successful runs, the application fails. During a review of the Ansible execution logs, the engineer discovers an error output that indicates that one of the stages failed. What is the cause of this issue?

A.

ansible builtm script Ansible module

B.

gather and create.py Python script

C.

load_and_parse.py Python script

D.

provision cpes.yml Ansibte playbook

Question # 30

Drag and drop the git commands from the left into the correct order on the right to create a feature branch from the master and then incorporate that feature branch into the master.

Go to page: