Certbus > Cisco > Cisco Certified DevNet Professional > 350-901 > 350-901 Online Practice Questions and Answers

350-901 Online Practice Questions and Answers

Questions 4

User report that they can no longer process transactions with the online ordering application, and the logging dashboard is displaying these messages.

Fri Jan 10 19:37:31.123 EST 2020 [FRONTEND] INFO: Incoming request to add item to cart from user 45834534858

Fri Jan 10 19:37:31 247 EST 2020 [BACKEND] INFO: Attempting to add item to cart

Fri Jan 10 19:37:31 250 EST 2020 [BACKEND] ERROR: Failed to add item: MYSQLDB ERROR: Connection refused

What is causing the problem seen in these log messages?

A. The database server container has crashed.

B. The backend process is overwhelmed with too many transactions.

C. The backend is not authorized to commit to the database.

D. The user is not authorized to add the item to their cart.

Browse 414 Q&As
Questions 5

A developer must deploy a containerized application foe network device inventory management. The developer sets up a Kubernetes duster on two separate hypervisors. The SLA is not currently meeting a specified maximum value for network latencyjitter CPU/memory and disk I/O are functioning property. Which two design approaches resolve the issue'' (Choose two.)

A. Colocate services in the same pod

B. Replace the HDD drives with SSD drives

C. Enable IPv6 within the duster

D. Deploy the duster to a bare metal server

E. Upgrade the server NIC card

Browse 414 Q&As
Questions 6

Refer to the exhibit.

Which AP! call does an engineer use to delete the FQDN object?

A. DELETE /api/fmc_config/v1/domain/e276abec-e0f2-11e3-8169-6d9ed49b625f

B. DELETE /api/fmc_config/v1/domain/e276abec-e0f2-11e3-8169- 6d9ed49b625f/object/fqdns/005056BB-0B24-0ed3-0000-858993545263

C. DELETE /api/fmc_config/v1/domain?id=e276abec-e0f2-11e3-8169-6d9ed49b625f

D. DELETE /api/fmc_config/v1/domain/e276abec-e0f2-11e3-8169- 6d9ed49b625f/object/fqdns?id=005056BB-0B24-0ed3-0000-858993545263

Browse 414 Q&As
Questions 7

What are two building blocks of the 12-factor app? (Choose two.)

A. Stateful Processes

B. Easy access to underlying systems

C. Dev and Prod must be different

D. One codebase

E. Isolated Dependencies

Browse 414 Q&As
Questions 8

Refer to the exhibit.

Which configuration of method and parameter retrieves the health of a laptop connected to the network from Cisco DNA Center?

A. PUT; network-health;

B. GET; client-health;

C. GET; network-device;

D. POST; network-device;

Browse 414 Q&As
Questions 9

What is a benefit of using model-driven telemetry?

A. enables operational data to be collected at higher rates and a higher scale

B. enables the application to pull data faster than pushing the data

C. reduces the load on the server by enabling the client to pull data

D. simplifies the development of clients by using a single encoding standard for the data

Browse 414 Q&As
Questions 10

Which approach is used to protect East-West API traffic?

A. Use encryption between services

B. Install a perimeter firewall

C. Use a dedicated cloud connection service.

D. Implement an API gateway

Browse 414 Q&As
Questions 11

In the three-legged OAuth2 process, after the authorization server presents a form to the resource owner to grant access, what is the next step?

A. The resource owner authenticates and optionally authorizes with the authorization server.

B. The user who owns the resource initiates a request to the OAuth client.

C. If the resource owner allows access, the authorization server sends the OAuth client a redirection.

D. A form to allow or restrict access is submitted by the owner of the resource.

Browse 414 Q&As
Questions 12

Refer to the exhibit.

Which type of python dependency file is shown?

A. setup.py

B. TOML

C. packages

D. requirements.txt

Browse 414 Q&As
Questions 13

DRAG DROP

Drag and drop the code from the bottom of the code snippet to the blanks in the code to construct a Puppet manifest that configures a VRF instance on a Cisco IOS XR device. Not all options are used.

Select and Place:

Browse 414 Q&As
Questions 14

DRAG DROP

An engineer is developing a web-based application that will be used as a central repository for the HR department. The application needs to authenticate user access and encrypt communication. Drag and drop the steps from the left into the order on the right to install an application-specific SSL certificate.

Select and Place:

Browse 414 Q&As
Questions 15

DRAG DROP

A developer is creating a Python script to analyze errors during REST API call operations. The script will be used with Cisco solution and devices.

Drag and drop the code from the bottom to the box where the code is missing to implement control flow for handling unrecoverable REST API calls. Not all options are used.

Select and Place:

Browse 414 Q&As
Questions 16

DRAG DROP

Drag and drop the code from the bottom onto the box where the code is missing to enable an SSID by using the Cisco Meraki Dashboard API. Not all options are used.

Select and Place:

Browse 414 Q&As
Questions 17

DRAG DROP

Drag and drop the code from the bottom onto the box where the code is missing in the Ansible script to get the existing firewall rules from Cisco Meraki and store the results to a new variable. Not all options are used.

Select and Place:

Browse 414 Q&As
Questions 18

DRAG DROP

An engineer has created an NGINX web server. The server will be accessible from outside the organization. A public-key certificate must be installed before external access is allowed Drag and drop the steps from the left into the order on the right to configure the certificate. Not all options are used

Select and Place:

Browse 414 Q&As
Exam Code: 350-901
Exam Name: Developing Applications Using Cisco Core Platforms and APIs (DEVCOR)
Last Update: Apr 15, 2024
Questions: 414 Q&As

PDF

$45.99

VCE

$49.99

PDF + VCE

$59.99