$0.00
Cisco 350-901 Dumps

Cisco 350-901 Exam Dumps

Developing Applications using Cisco Core Platforms and APIs (DEVCOR)

Total Questions : 363
Update Date : November 01, 2024
PDF + Test Engine
$65 $95
Test Engine
$55 $85
PDF Only
$45 $75



Last Week 350-901 Exam Results

164

Customers Passed Cisco 350-901 Exam

93%

Average Score In Real 350-901 Exam

97%

Questions came from our 350-901 dumps.



Choosing the Right Path for Your 350-901 Exam Preparation

Welcome to PassExamHub's comprehensive study guide for the Developing Applications using Cisco Core Platforms and APIs (DEVCOR) exam. Our 350-901 dumps is designed to equip you with the knowledge and resources you need to confidently prepare for and succeed in the 350-901 certification exam.

What Our Cisco 350-901 Study Material Offers

PassExamHub's 350-901 dumps PDF is carefully crafted to provide you with a comprehensive and effective learning experience. Our study material includes:

In-depth Content: Our study guide covers all the key concepts, topics, and skills you need to master for the 350-901 exam. Each topic is explained in a clear and concise manner, making it easy to understand even the most complex concepts.
Online Test Engine: Test your knowledge and build your confidence with a wide range of practice questions that simulate the actual exam format. Our test engine cover every exam objective and provide detailed explanations for both correct and incorrect answers.
Exam Strategies: Get valuable insights into exam-taking strategies, time management, and how to approach different types of questions.
Real-world Scenarios: Gain practical insights into applying your knowledge in real-world scenarios, ensuring you're well-prepared to tackle challenges in your professional career.

Why Choose PassExamHub?

Expertise: Our 350-901 exam questions answers are developed by experienced Cisco certified professionals who have a deep understanding of the exam objectives and industry best practices.
Comprehensive Coverage: We leave no stone unturned in covering every topic and skill that could appear on the 350-901 exam, ensuring you're fully prepared.
Engaging Learning: Our content is presented in a user-friendly and engaging format, making your study sessions enjoyable and effective.
Proven Success: Countless students have used our study materials to achieve their 350-901 certifications and advance their careers.
Start Your Journey Today!

Embark on your journey to Developing Applications using Cisco Core Platforms and APIs (DEVCOR) success with PassExamHub. Our study material is your trusted companion in preparing for the 350-901 exam and unlocking exciting career opportunities.

Cisco 350-901 Sample Question Answers

Question # 1

A developer is deploying an application to automate the configuration and management ofOsco network files and routers The application must use REST API interface lo achieveprogrammability. The security team mandates that the network must be protected againstDDoS attacks What mitigates the attacks without impacting genuine requests?

A. API rate limiting at the application layer
B. IP address filtering at the application layer
C. traffic routing on the network perimeter
D. firewall on the network perimeter



Question # 2

When an application is designed that requires high availability, what is a reason to use across-region cloud?

A. Provide disaster recovery protection
B. Protect from a single component failure
C. Minimize costs
D. Account for failure in another zone



Question # 3

An engineer is developing a Docket container for an application in Python For securityreasons the application needs to be accessible on port 5001 only Which line should beadded to the dockerfile m order to accomplish this?

A. ENTRYPOINT 5001
B. PORT SRC 5001
C. ADO PORT 5001
D. EXPOSE 5001



Question # 4

A custom dashboard of the network health must be created by using Cisco DNA CenterAPIs An existing dashboard is a RESTful API that receives data from Cisco DNA Center asa new metric every time the network health information is sent from the script to thedashboard Which set of requests creates the custom dashboard?

A. PUT request to Cisco DNA Center to obtain the network health information and then aPOST request to the dashboard to publish the new metric
B. POST request to Cisco DNA Center to obtain the network health information and then aGET request to the dashboard to publish the new metric
C. GET request to Cisco DNA Center to obtain the network health information and then aPUT request to the dashboard to publish the new metric
D. GET request to Cisco DNA Center to obtain the network health information and then aPOST request to the dashboard to publish the new metric



Question # 5

An application has these characteristics• provide one service or function• distributed database• API gateway• central repository for code• configuration database• uses session managementWhich two design approaches contribute to the scalability of the application'? (Choose two)

A. built to scale based on a star topology
B. modular design iteration
C. session management in a stateless architecture
D. planned before the first device is deployed
E. distributed computing with tightly coupled components



Question # 6

A web application is being developed to provide online sales to a retailer. The customerswill need to use their username and passwords to login into then profile and complete theirorder For this reason the application must store user passwords Which approach ensuresthat an attacker wifi need to crack the passwords one at a time?

A. Apply the peppering technique
B. Store the passwords by using asymmetric encryption
C. Apply the salting technique
D. Store the passwords by using symmetric encryption



Question # 7

How is AppDynamics used to instrument an application?

A. Provides visibility into the transaction logs that can be correlated to specific businesstransaction requests
B. Enables instrumenting a backend web server (or packet installation by using anAppDynamics agent
C. Retrieves a significant amount of information from the perspective of the databaseserver by using application monitoring
D. Monitors traffic flows by using an AppDynamics agent installed on a networkinfrastructure device



Question # 8

Given an application that implements a basic search function as Well as a video uploadfunction , which two load-balancing approachesoptimize the application's user experience? (Choose two.)

A. Video upload requests should be routed to the endpoint using an intermediate hop.
B. Video upload requests should be routed to the endpoint with highest data throughput.
C. Video upload requests should be routed to the endpoint with lowest round-trip latency.
D. Search requests should be routed to the endpoint with lowest round-trip latency.
E. Search requests should be routed to the endpoint with highest data throughput.



Question # 9

Which two encryption principles should be applied to secure APIs? (Choose two.)

A. Use temporary files as part of the encryption and decryption process
B. Transmit authorization information by using digitally signed payloads 
C. Use encrypted connections to protect data n transit 
D. Reuse source code that contain existing UUIDs 
E. Embed keys in code to simplify the decryption process



Question # 10

What is a benefit of using model-driven telemetry?

A. enables operational data to be collected at higher rates and a higher scale 
B. enables the application to pull data faster than pushing the data 
C. reduces the load on the server by enabling the client to pull data
D. simplifies the development of clients by using a single encoding standard for the data



Question # 11

An architect must optimize traffic that targets a popular API endpoint Currently, theapplication downloads a large file hourly, but often the file is unchanged and the downloadcauses unnecessary load and delays Which cURL command must be used to determinethe last modified date of the file and to optimize the API usage?

A. curl GET request
B. curl HEAD request
C. curl --silent request
D. curl -H 'Cache-Control: no-cache' request



Question # 12

A developer deploys a web application in a local data center that is now experiencing hightraffic load from users accessing data through REST API calls. Which approach enhancesthe responsiveness and performance of the API?

A. Use HTTP POST or other non-read methods for read requests when possible
B. Ensure that all read requests are clearly identified by the PUT method
C. Configure API payload to return errors in HTTP 200 responses
D. Use HTTP standard authorization header to submit authentication credentials



Question # 13

Which scenario is an example of the pseudonymization of sensitive data that meets GDPRrequirements? 

A. encrypting sensitive data at rest by using native cloud services and data in transit byusing SSL/TLS transport
B. implementing XFowarded For at the frontend of a web app to enable the source IPaddresses of headers to change
C. leveraging an application load balancer at the frontend of a web app for SSL/TLSdecryption to inspect data in transit 
D. separating the sensitive data into its own dedicated secured data store and using tokensin its place



Question # 14

Which command is used 10 enable application hosting on a Cisco IOS XE device?

A. iox
B. iox-service
C. application -honing
D. app- hosting



Question # 15

What is the result of a successful OAuth2 authorization grant flow?

A. The user has the application rights that correspond to the user's role within theapplication's database
B. The application is provided with a token that allows actions on services on the user'sbehalf
C. The user has administrative rights to the application's backend services
D. The third-party service is provided with a token that allows actions to be performed



Question # 16

Which security approach should be used for developing a REST API? 

A. Use custom security relevant HTTP response codes
B. Utilise TLS for end to end encryption 
C. Add an API key to each URL string
D. Utilize CORS headers



Question # 17

A Cisco Catalyst 9000 switch has guest shell enabled. Which Linux command installs athird-party application?

A. yum Install <package-name>
B. apt-get install <package-name>
C. zypper install <package-name>
D. dnf install <package-name>



Question # 18

A timeframe custom dashboard must be developed to present data collected from CiscoMeraki. The dashboard must include a wireless health alert count. What needs to be builtas a prerequisite?

A. A publicly available HTTP server to receive Meraki Webhooks from the MerakiDashboard API 
B. A publicly available HTTP server to receive Meraki Webhooks from the Meraki ScanningAPI 
C. A daemon to consume the Wireless Health endpoint of the Meraki Scanning API
D. A daemon to consume the Wireless Health endpoint of the Meraki Dashboard API



Question # 19

A developer wants to automate virtual infrastructure to provision and manage it. Thesystem will be implemented m large-scale deployment while offering redundancy andscalability with ease of management The solution must meet these requirements:• Support the provisioning of up to 500 new virtual machines into private datacenters or thepublic cloud• Support the modeling of a complex environment that consists of multiple virtual machineswhile supporting disaster recovery• Maintain steady-state environmentsWhich configuration management solution must the developer use?

A. Puppet
B. Terraform
C. Docker
D. Arable



Question # 20

Which OAuth mechanism enables clients to continue to have an active access tokenwithout further interaction from the user?

A. JWT
B. password grant 
C. refresh grant 
D. preshared key



Question # 21

A developer has issued git add file1 and file2 test.py command to add the three files for thenext commit, but then decides to executed test.py from this command. Which commandneeds to be used to exclude test.py from this commit but keep the rest of the files?

A. git clean — test.py
B. git reset - test py
C. git checkout - file1 file2
D. git stash -- file1 file 2



Question # 22

What is a well-defined concept for GDPR compliance?

A. Records that are relevant to an existing contract agreement can be retained as long asthe contract is in effect.
B. Data controllers must confirm to data subjects as to whether where, and why personaldata is being processed.
C. Personal data that was collected before the compliance standards were set do not needto be protected.
D. Compliance standards apply to organizations that have a physical presence in Europe.



Question # 23

Which function does Fluentd fulfill for application logging in Kubernetes? 

A. logging agent for distribution
B. backend time series database storage 
C. monitoring and log visualization 
D. messaging queueig infrastructure



Question # 24

Which two countermeasures help reduce the risk of playback attacks? (Choose two.)

A. Store data in a NoSQL database.
B. Implement message authentication (HMAC).
C. Enable end-to-end encryption.
D. Remove stack traces from errors.
E. Use short-lived access tokens.



Question # 25

An enterprise refactors its monolithic application into a modem cloud-native application thatis based on microservices. A key requirement of the application design is to ensure that theIT team is aware of performance issues or bottlenecks in the new application Which twoapproaches must be part of the design considerations'' (Choose two.)

A. Periodically scale up the resources of the host machines when the application starts toexperience high loads
B. Instrument the application code to gather telemetry data from logs, metrics or tracing
C. Adopt a service-oriented architecture to handle communication between the servicesthat make up the application
D. Deploy infrastructure monitoring agents into the operating system of the host machines
E. Implement infrastructure monitoring to ensure that pipeline components interoperatesmoothly and reliably



Question # 26

What are two building blocks of the 12-factor app? (Choose two.)

A. Stateful Processes
B. Easy access to underlying systems
C. Dev and Prod must be different 
D. One codebase
E. Isolated Dependencies



Question # 27

Refer to the exhibit Pipenv is used to manage dependencies The test funs successfully ona local environment. What is the reason for the error when running the test on a CI'CDpipeline? 

A. The piple in the local environment was not pushed to the remote repository 
B. All the unit tests in testsum py failed
C. Pytest did not detect any functions that start with test_'.
D. Nose2 was not used as the test runner



Question # 28

What are two steps in the OAuth2 protocol flow? (Choose two.) 

A. The user is authenticated by the authorization server and granted an access token.
B. The user’s original credentials are validated by the resource server and authorization isgranted.
C. The user indirectly requests authorization through the authorization server.
D. The user requests an access token by authentication and authorization grantpresentation.
E. The user requests the protected resource from the resource server using the originalcredentials.



Question # 29

When end-to-end encryption is implemented, which area is most vulnerable to exploitation? 

A. cryptographic key exchange
B. endpoint security
C. cryptographic key generation
D. security of data in transit



Question # 30

What is the function of dependency management? 

A. separating code into modules that execute independently  
B. utilizing a single programming language/framework for each code project  
C. automating the identification and resolution of code dependencies  
D. managing and enforcing unique software version names or numbers  



Question # 31

A developer is building an application to access a website. When running the application, an HTTP 403 error code has been received. How should the application be modified to handle this code?

A. Create a loop on cancel the operation and run a new one after the code is received.  
B. Use exponential backoff when retrying distributed services and other remote endpoints.  
C. Build a try/except around the urlopen to find errors occurring in the request.  
D. Redirect the request to an internal web server and make a new request from the internal resource



Question # 32

Which two types of organization are subject to GDPR? (Choose two.) 

A. only organizations that operate outside the EU  
B. any organization that offers goods or services to customers in the EU  
C. only organizations that have offices in countries that are part of the EU
D. any organization that operates within the EU
E. only organizations that physically reside in the EU



Question # 33

Which two gRPC modes of model-driven telemetry are supported on Cisco IOS XE Software? (Choose two.)

A. dial-in
B. dial-out
C. call-in
D. call-out
E. passive



Question # 34

What is the gRPC Network Management Interface protocol? 

A. a unified management protocol for streaming telemetry and database logging
B. a configuration management protocol for monitoring
C. a protocol for configuration management and streaming telemetry
D. a logging protocol used across database servers



Question # 35

An application has been developed for monitoring rooms in Cisco Webex. An engineeruses the application toretrieve all the messages from a Cisco Webex room, but the results are slowly presented.Which actionoptimizes calls to retrieve the messages from the /v1/messages endpoint?

A. Define the ma property by using the pagination functionality.
B. Set the beforeMessage property to retrieve the messages sent before a specificmessage ID.
C. Avoid unnecessary calls by using a prior request to /v1/rooms to retrieve the last activityproperty.
D. Filter the response results by specifying the created property in the request.



Question # 36

An application is hosted on Google Kubernetes Engine. A new JavaScript module is created to work with the existing application. Which task is mandatory to make the code ready to deploy?

A. Create a Dockerfile for the code base.
B. Rewrite the code in Python.
C. Build a wrapper for the code to “containerize” it.
D. Rebase the code from the upstream git repo.