Great Cisco 350-901 DEVCOR Exam Updated Dumps dumps2022-03-14T02:21:02+00:00 dumps Cisco 350-901 DEVCOR exam dumps, updated Cisco 350-901 DEVCOR exam 0 Comments Cisco 350-901 DEVCOR exam updated dumps are great in the preparation. It is easy for you to pass Cisco 350-901 DEVCOR exam with studying the updated version. Free updated Cisco 350-901 DEVCOR exam dumps are below. Page 1 of 8 Loading... 1. An organization manages a large cloud-deployed application that employs a microservices architecture across multiple data centers. Reports have received about application slowness. The container orchestration logs show that faults have been raised in a variety of containers that caused them to fail and then spin up brand new instances. Which two actions can improve the design of the application to identify the faults? (Choose two.)Automatically pull out the container that fails the most over a time period.Implement a tagging methodology that follows the application execution from service to service.Add logging on exception and provide immediate notification.Do a write to the datastore every time there is an application failure.Implement an SNMP logging system with alerts in case a network link is slow. Loading... 2. Refer to the exhibit. A network engineer writes a script to test authentication workflow using Python and REST API. The engineer wants to ensure that the script handles expected errors by matching output to HTTP status codes. The scnpt uses the Python requests module . Which line of code must be added on the snippet where the code is missing?requests.error_coderesponse.sutus_coderesponserequests.post Loading... 3. A developer deploys a SQLite database in a Docker container. Single-use secret keys are generated each time a user accesses the database. The keys expire after 24 hours. Where should the keys be stored?Outside of the Docker container in the source code of applications that connect to the SQLite database.In a separate file inside the Docker container that runs the SQLite database.In an encrypted database table within the SQLite database.In a separate storage volume within the Docker container. Loading... 4. DRAG DROP Drag and drop the descriptions from the left onto the related OAuth-defined roles on the right. Loading... 5. Refer to the exhibit. Which set of API requests must be executed by a Webex Teams bot after receiving a webhook callback to process messages in a room and reply with a new message back to the same room? A) B) C) D) Option AOption BOption COption D Loading... 6. Which load balancing algorithm balances load based on the active sessions of a node?weighted round-robinIP source affinityleast connectionssticky session Loading... 7. User report that they can no longer process transactions with the online ordering application, and the logging dashboard is displaying these messages. Fri Jan 10 19:37:31.123 EST 2020 [FRONTEND] INFO: Incoming request to add item to cart from user 45834534858 Fri Jan 10 19:37:31 247 EST 2020 [BACKEND] INFO: Attempting to add item to cart Fri Jan 10 19:37:31 250 EST 2020 [BACKEND] ERROR: Failed to add item: MYSQLDB ERROR: Connection refused What is causing the problem seen in these log messages?The database server container has crashed.The backend process is overwhelmed with too many transactions.The backend is not authorized to commit to the database.The user is not authorized to add the item to their cart. Loading... 8. An engineer must enable an SSID in a Meraki network . Which request accomplishes this task?PUT /networks/{networkld}/ssids/{number} {"enable": true)POST /networks/{networkid}/ssids/{number) {"enable": true)PUT /networks/{networkld}/ssids/{number}?enabled=truePOST /networks/{networkid}/sslds/{number}?enabled=true Loading... 9. DRAG DROP Drag and drop the code from the bottom onto the box where the code is missing in the Python script to execute a REST API call to query all the NTP policy names and print the name of each policy. Not all options are used. Loading... 10. An automated solution is needed to configure VMs in numerous cloud provider environments to connect the environments to an SDWAN. The SDWAN edge VM is provided as an image in each of the relevant clouds and can be given an identity and all required configuration via cloud-init without needing to log into the VM once online. Which configuration management and/or automation tooling is needed for this solution?AnsibleAnsible and TerraformNSOTerraformAnsible and NSO Page 2 of 8 Loading... 11. An Etag header is included in the HTTP response for an API resource . What are two benefits of using the value of the Etag for future interactions involving the same API resource? (Choose two.)caching and optimization of response payloadscreating conditional requestscategorizing and comparing this API resource with otherschecking the integrity of the resourcerequesting the list of operations authorized for this resource Loading... 12. How is client code that consumes gRPC telemetry implemented, assuming that the preferred language is able to be chosen?Parse the OpenAPI spec modelCompile the protocol buffers IDLLeverage a Thrift code generator to parse a Thrift IDLReview the Swagger API documentation to build client code Loading... 13. A developer has issued git add file1 and file2 test.py command to add the three files for the next commit, but then decides to executed test.py from this command . Which command needs to be used to exclude test.py from this commit but keep the rest of the files?git clean ― test.pygit reset - test pygit checkout - file1 file2git stash -- file1 file 2 Loading... 14. A Cisco Catalyst 9000 switch has guest shell enabled . Which Linux command installs a third-party application?yum Install <package-name>apt-get install <package-name>zypper install <package-name>dnf install <package-name> Loading... 15. Which snippet presents the correct API call to configure, secure, and enable an SSID using the Meraki API? A) B) C) D) Option AOption BOption COption D Loading... 16. Which two methods are API security best practices? (Choose two.)Use tokens after the identity of a client has been established.Use the same operating system throughout the infrastructure.Use encryption and signatures to secure data.Use basic auth credentials over all internal API interactions.Use cloud hosting services to manage security configuration. Loading... 17. DRAG DROP Drag and drop the code from the bottom onto the box where the code is missing to retrieve and display wireless network hearth information. The wireless network devices are being managed by Cisco DNA Center and are compatible with REST API Not all options are used. Loading... 18. DRAG DROP Drag and drop the code from the bottom onto the box where the code is rrnssmg to create a Webex space Not ail options are used. Loading... 19. DRAG DROP Refer to the exhibit. Drag and drop the code snippets from the bottom onto the boxes where the code is missing to retrieve a list of all the members of a specific Cisco Webex organization Not at options are used. Loading... 20. An application has these characteristics • provide one service or function • distributed database • API gateway • central repository for code • configuration database • uses session management Which two design approaches contribute to the scalability of the application'? (Choose two )built to scale based on a star topologymodular design iterationsession management in a stateless architectureplanned before the first device is deployeddistributed computing with tightly coupled components Page 3 of 8 Loading... 21. DRAG DROP Refer to the exhibit. A developer is creating a Python script to use the Webex Teams REST API to list joined spaces, retry after the server-specified amount of time if a “Too many requests” response is received, and print any other error that is received. Drag and drop the code snippets from the left onto the item numbers on the right that match the missing sections in the exhibit to complete the script. Not all code snippets are used. Loading... 22. A heterogeneous network of vendors and device types needs automating for better efficiency and to enable future automated testing. The network consists of switches, routers, firewalls and load balancers from different vendors, however they all support the NETCONF/RESTCONF configuration standards and the YAML models with every feature the business requires. The business is looking for a buy versus build solution because they cannot dedicate engineering resources, and they need configuration diff and rollback functionality from day 1. Which configuration management for automation tooling is needed for this solution?AnsibleAnsible and TerraformNSOTerraformAnsible and NSO Loading... 23. DRAG DROP Drag and drop the git commands from the left into the correct order on the right to create a feature branch from the master and then incorporate that feature branch into the master. Loading... 24. Refer to the exhibit. A) B) C) D) Option AOption BOption COption D Loading... 25. DRAG DROP Refer to the exhibit. Drag and drop the code snippets from the left onto the item numbers on the right that match the missing sections in the exhibit to complete the script to implement control flow. Loading... 26. Refer to the exhibit. Which parameter is missing from the JSON response to confirm the API version that is used?version 4v 102version 2 Loading... 27. What is a characteristic of a monolithic architecture?It is an application with multiple independent parts.New capabilities are deployed by restarting a component of the application.A service failure can bring down the whole application.The components are platform-agnostic. Loading... 28. When end-to-end encryption is implemented, which area is most vulnerable to exploitation?cryptographic key exchangeendpoint securitycryptographic key generationsecurity of data in transit Loading... 29. Refer to the exhibit . Which snippet creates a Webex Teams space and adds the users in the variable user list to that space? A) B) C) D) Option AOption BOption COption D Loading... 30. An application has initiated an OAuth authorization code grant flow to get access to an API resource on behalf of an end user. Which two parameters are specified in the HTTP request coming back to the application as the end user grants access? (Choose two.)access token and a refresh token with respective expiration times to access the API resourceaccess token and expiration time to access the API resourceredirect URI a panel that shows the list of permissions to grantcode that can be exchanged for an access tokenstate can be used for correlation and security checks Page 4 of 8 Loading... 31. A bot has been created, called "386231131”, to respond to alarm messages. A developer is now creating a Webhook to allow the bot to respond to messages . Which format allows the Webhook to respond to messages for the bot within Webex Teams? A) B) C) D) Option AOption BOption COption D Loading... 32. DRAG DROP A network engineer needs to retrieve interface data using the Cisco IOS XE YANG Model. Drag and drop the components from the bottom onto the box where the code is missing to complete the RESTCONF URI. Not all options are used. Loading... 33. A developer releases a new application for network automation of Cisco devices deployed m a local data center. The application utilizes complex design patterns such as microservices that host multiple third-party libraries and programming languages. The development must be simplified by implementing an observability-driven development lifecycle. Which two considerations must be taken to meet the requirements? (Choose two.)description of low-level errorswhich KPls to monitorrelevant metrics to exposewhich monitoring tools to useidentifying customer priorities Loading... 34. Refer to the exhibit. What is the missing step in deploying a Docker container to lOx?Pull/push the image to the Docker registry,Build the package.yaml file.Build the package.cert file to sign the app ,Log in to Device Manager. Loading... 35. In the three-legged OAuth2 authorization workflow, which entity grants access to a protected resource?resource serverresource ownerclientauthorization server Loading... 36. A developer must deploy a containerized application foe network device inventory management. The developer sets up a Kubernetes duster on two separate hypervisors. The SLA is not currently meeting a specified maximum value for network latencyjitter CPU/memory and disk I/O are functioning property . Which two design approaches resolve the issue'' (Choose two.)Colocate services in the same podReplace the HDD drives with SSD drivesEnable IPv6 within the dusterDeploy the duster to a bare metal serverUpgrade the server NIC card Loading... 37. Refer to the exhibit. Interface Lookback 1 must be created with IP address 10.30.0.1/24 in a Cisco IOS XE device using RESTCONF. The schema that is defined by the exhibit must be used . Which body and URI should be used for this operation? A) B) C) D) Option AOption BOption COption D Loading... 38. A network operations team is using the cloud to automate some of their managed customer and branch locations. They require that all of their tooling be ephemeral by design and that the entire automation environment can be recreated without manual commands. Automation code and configuration state will be stored in git for change control and versioning. The engineering high-level plan is to use VMs in a cloud- provider environment then configure open source tooling onto these VMs to poll, test, and configure the remote devices, as well as deploy the tooling itself. Which configuration management and/or automation tooling is needed for this solution?AnsibleAnsible and TerraformNSOTerraformAnsible and NSO Loading... 39. Refer to the exhibit. Which action will complete the workflow that represents how an API call sends multiple messages?{PUT} messages(roomID){PUT} messages(BearerToken){POST} messages(roomID){POST} messages(BearerToken) Loading... 40. Refer to the exhibits which show the documentation associated with the create port object API cafl in Cisco Firepower Threat Defense, and a cURL command . Which data payload completes the cURL command to run the APi call? A) B) C) D) Option AOption BOption COption D Page 5 of 8 Loading... 41. Refer to the exhibit. An application has been developed to serve the users in an enterprise After HTTP cache controls are implemented m the application users report that they receive state data when they refresh the page Without removing HTTP cache controls, which change ensures that the users get current data when refreshing the page'Reduce the expire_after value to 60.Add a Cache-Control header that has a value of no-cache, no-store must-revalidate.Add an H-None-Match header that has a value of an Entity Tag.Add an Expires header that has a value of 0. Loading... 42. Which two statements describe advantages of static code analysis over unit tests? (Choose two.)It checks for potential tainted data where input is not checked.It enforces proper coding standards and style.It performs a quick analysis of whether tests will pass or fail when run.It checks for race conditions in threaded applications.It estimates the performance of the code when run. Loading... 43. Refer to the exhibit. As part of the Ansible playbook workflow, several new interfaces are being configured using the netconf_config module. The task references the interface variables that are unique per device. In which directory is the YAML file with these variables found?host_vars directoryhome directorygroup_vars directorycurrent working directory Loading... 44. What is a capability of the End User Monitoring feature of the AppDynamics platform?discovers traffic flows, nodes, and transport connections where network or application/network issues are developingmonitoring local processes, services, and resource use, to explain problematic server performanceidentifies the slowest mobile and IoT network requests, to locate the cause of problemsprovides metrics on the performance of the database to troubleshoot performance-related issues Loading... 45. Which database type should be used with highly structured data and provides support for ACID transactions?time seriesdocumentgraphrelational Loading... 46. DRAG DROP Refer to the exhibit. Drag and drop the code snippets from the left onto the item numbers on the right that match the missing sections in the curl exhibit to complete the cURL request to FirePower Device Manager API to create objects. Not all code snippets are used. Loading... 47. Which two strategies are used to protect personally identifiable information? (Choose two.)Encrypt data in transit.Encrypt hash values of data.Encrypt data at rest.Only hash usernames and passwords for efficient lookup.Only encrypt usernames and passwords for efficient lookup. Loading... 48. Refer to the exhibit. An engineer is managing a network that consists of Cisco IOSXE devices. There is a need to retrieve the details of the interface GigabitEthernet2 using RESTCONF . Which URI will accomplish this by providing the same response as shown in the JSON body? A) B) C) D) Option AOption BOption COption D Loading... 49. Refer to the exhibit. Which code snippet is required in the headers to successfully authorize wireless information from Cisco DNA Center?headers = {‘X-auth-token’:’fa8426a0-8eaf-4d22-8e13-7c1b16a9370c’}headers = {‘Authorization’:’Basic YWRtaW46R3JhcGV2aW5IMQ==’}headers = {‘Authorization’:’Bearer ASDNFALKJER23412RKDALSNKF”}headers = {‘Content-type’:’application/json} Loading... 50. Which type of file is created from issued intermediate, root, and primary certificates for SSL installation on a server?DERCSRPEMCRT Page 6 of 8 Loading... 51. DRAG DROP Drag and drop the code onto the snippet to update a SSID in Meraki using the Dashboard API. Not all options are used. Loading... 52. DRAG DROP A Python application is being written to run inside a Cisco IOS XE device to assist with gathering telemetry data. Drag and drop the elements of the stack from the left onto the functions on the right to collect and display the telemetry streaming data. Loading... 53. Refer to the exhibit. A Docker swarm service is currently running m a local data center. The service is hosting an HTML website it the container fads then the service becomes unavailable. The design must meet these requirements • The service must be highly available and resilient against a data center outage. • The service must be accessible from a single URL • The HTTP session must remain on the server from which the original request was sent • Failure of the server must force the client to reconnect Which two design approaches must be used to meet the requirements? (Choose two.)Create another swarm cluster within a data center and deploy a secondary instance of the service.Create another node in the swarm duster to scale the service across the nodes over two replicas.Configure an external load balancer to route requests to the swarm service by using session persistenceScale the Docker swarm service to 2 and set endpoint-mode to DNSRR instead of the default value of VIPConfigure a routing mesh to route requests to the swarm service by using NAT on the network side Loading... 54. Which two techniques protect against injection attacks? (Choose two.)input validationtrim whitespacelimit text areas to 255 charactersstring escaping of user free text and data entryonly use dropdown, checkbox, and radio button fields Loading... 55. DRAG DROP Refer to the exhibit. Drag and drop the code snippets from the left onto the item numbers on the right that match the missing sections in the cURL exhibit to complete the cURL request to FirePower Device Manager API to create objects. Not all code snippets are used. Loading... 56. An organization manages a large cloud-deployed application that employs a microservices architecture. No notable issues occur with downtime because the services of this application are redundantly deployed over three or more data center regions. However, several times a week reports are received about application slowness. The container orchestration logs show faults in a variety of containers that cause them to fail and then spin up brand new. Which action must be taken to improve the resiliency design of the application while maintaining current scale?Update the base image of the containers.Test the execution of the application with another cloud services platform.Increase the number of containers running per service.Add consistent “try/catch(exception)” clauses to the code. Loading... 57. A developer is building an application to access a website. When running the application, an HTTP 403 error code has been received . How should the application be modified to handle this code?Create a loop on cancel the operation and run a new one after the code is received.Use exponential back off when retrying distributed services and other remote endpoints.Build a try/except around the urlopen to find errors occurring in the request.Redirect the request to an internal web server and make a new request from the internal resource. Loading... 58. An enterprise refactors its monolithic application into a modem cloud-native application that is based on microservices. A key requirement of the application design is to ensure that the IT team is aware of performance issues or bottlenecks in the new application. Which two approaches must be part of the design considerations? (Choose two)Periodically scale up the resources of the host machines when the application starts to experience high loadsInstrument the application code to gather telemetry data from logs, metrics or tracingAdopt a service-oriented architecture to handle communication between the services that make up the applicationDeploy infrastructure monitoring agents into the operating system of the host machinesImplement infrastructure monitoring to ensure that pipeline components interoperate smoothly and reliably Loading... 59. A local Docker container with a Container ID of 391441516e7a is running a Python application . Which command is used to connect to a bash shell in the running container? Option AOption BOption COption D Loading... 60. An architect must optimize traffic that targets a popular API endpoint Currently, the application downloads a large file hourly, but often the file is unchanged and the download causes unnecessary load and delays. Which cURL command must be used to determine the last modified date of the file and to optimize the API usage?curl GET requestcurl HEAD requestcurl --silent requestcurl -H 'Cache-Control: no-cache' request Page 7 of 8 Loading... 61. Which two data encoding techniques are supported by gRPC? (Choose two.)XMLJSONASCIIProtoBufYAML Loading... 62. Refer to the exhibit. Which line of code needs to be placed on the snippet where the code is missing to provide APl rate-limiting to the requests?int(self.response.headers.post('Retry-After'))int(response.headers.get('Retry-After'))int(self.response.headers.get(Retry-After'))int(response.headers.post('Retry-After')) Loading... 63. Refer to the exhibit. A developer must configure an SSL certificate for an nginx web server. Which code must be added on the script to accomplish this configuration? A) B) C) D) Option AOption BOption COption D Loading... 64. Refer to the exhibit. An Intersight API is being used to query RackUnit resources that have a tag keyword set to “Site” . What is the expected output of this command?list of all resources that have a tag with the keyword “Site”error message because the Value field was not specifiederror message because the tag filter should be lowercaselist of all sites that contain RackUnit tagged compute resources Loading... 65. Refer to the exhibit. An engineer is configuring Ansible to run playbooks against Cisco IOS XE Software . What should be configured in ansible.cfg as the connection type?network_clisshshellcommand Loading... 66. Refer to the exhibit. A Python script must list network clients in the Cisco Meraki API that have used a network with an ID of 2. The number of client entries per returned page is restricted to 1.000 according to the API specification Network 2 has 2.500 clients. What must be added where the code is missing to print the content of each response? A) B) C) D) Option AOption BOption COption D Loading... 67. DRAG DROP Drag and drop the characteristics from the left onto the correct data processing techniques on the right, in the context of GDPR. Loading... 68. A team of developers created their own CA and started signing certificates for all of their loT devices,. Which action will make the browser accept these certificates?Set the private keys 1024-bit RSPreload the developer CA on the trusted CA list of the browser.Enable HTTPS or port 443 on the browser.install a TLS instead of SSL certificate on the loT devices. Loading... 69. How should a web application be designed to work on a platform where up to 1000 requests per second can be served?Use algorithms like random early detection to deny excessive requests.Set a per-user limit (for example, 5 requests/minute/user) and deny the requests from the users who have reached the limit.Only 1000 user connections are allowed; further connections are denied so that all connected users can be served.All requests are saved and processed one by one so that all users can be served eventually. Loading... 70. Refer to the exhibits. An interface named “GigabitEthernet2” has been configured on a Cisco IOS XE device. Using RESTCONF APIs as defined by the [email protected] model, which two combinations of “rest_operation” and “payload” must be added to the Python script to set the “description” to “Configured by RESTCONF”? (Choose two.) Option AOption BOption COption DOption E Page 8 of 8 Loading... 71. Refer to the exhibit. A Python script has these requirements • Retrieve a list of Bluetooth clients seen by the access pants on a network. • Print the content of the response • Retrieve the next page only if it is available in the response headers What must be added where the code is missing to get the remaining pages by using the next link from the link response header of the last request? A) B) C) D) Option AOption BOption COption D Loading... 72. Which Git command enables the developer to revert back to f414f31 commit to discard changes in the current working tree?git reset-hard f414f31git reset checkout-hard f414f31git reset-soft f414f31git checkout f414f31 Loading... 73. DRAG DROP Drag and drop the code from the bottom onto the where the code is missing to create a host object by using the Cisco Firepower Device Manager API. Not all options are used. Loading... 74. Which two types of organization are subject to GDPR? (Choose two.)only organizations that operate outside the EUany organization that offers goods or services to customers in the EUonly organizations that have offices in countries that are part of the EUany organization that operates within the EUonly organizations that physically reside in the EU Loading... Share this post Facebook Twitter LinkedIn Google + Email Leave a Reply Cancel replyYour email address will not be published. Required fields are marked *Comment * Name * Email * Website Save my name, email, and website in this browser for the next time I comment.
Leave a Reply