Exam Code | 350-901 |
Exam Name | Developing Applications using Cisco Core Platforms and APIs (DEVCOR) |
Questions | 363 Questions Answers With Explanation |
Update Date | November 08,2024 |
Price |
Was : |
Are you ready to take your career to the next level with Developing Applications using Cisco Core Platforms and APIs (DEVCOR)? At Prep4Certs, we're dedicated to helping you achieve your goals by providing high-quality 350-901 Dumps and resources for a wide range of certification exams.
At Prep4Certs, we're committed to your success in the Cisco 350-901 exam. Our comprehensive study materials and resources are designed to equip you with the knowledge and skills needed to ace the exam with confidence:
Start Your Certification Journey Today
Whether you're looking to advance your career, expand your skill set, or pursue new opportunities, Prep4Certs is here to support you on your certification journey. Explore our comprehensive study materials, take your exam preparation to the next level, and unlock new possibilities for professional growth and success.
Ready to achieve your certification goals? Begin your journey with Prep4Certs today!
A developer is deploying an application to automate the configuration and management ofOsco network files and routers The application must use REST API interface lo achieveprogrammability. The security team mandates that the network must be protected againstDDoS attacks What mitigates the attacks without impacting genuine requests?
A. API rate limiting at the application layer
B. IP address filtering at the application layer
C. traffic routing on the network perimeter
D. firewall on the network perimeter
Refer to the exhibit.
A. Option A
B. Option B
C. Option C
D. Option D
When an application is designed that requires high availability, what is a reason to use across-region cloud?
A. Provide disaster recovery protection
B. Protect from a single component failure
C. Minimize costs
D. Account for failure in another zone
An engineer is developing a Docket container for an application in Python For securityreasons the application needs to be accessible on port 5001 only Which line should beadded to the dockerfile m order to accomplish this?
A. ENTRYPOINT 5001
B. PORT SRC 5001
C. ADO PORT 5001
D. EXPOSE 5001
A custom dashboard of the network health must be created by using Cisco DNA CenterAPIs An existing dashboard is a RESTful API that receives data from Cisco DNA Center asa new metric every time the network health information is sent from the script to thedashboard Which set of requests creates the custom dashboard?
A. PUT request to Cisco DNA Center to obtain the network health information and then aPOST request to the dashboard to publish the new metric
B. POST request to Cisco DNA Center to obtain the network health information and then aGET request to the dashboard to publish the new metric
C. GET request to Cisco DNA Center to obtain the network health information and then aPUT request to the dashboard to publish the new metric
D. GET request to Cisco DNA Center to obtain the network health information and then aPOST request to the dashboard to publish the new metric
An application has these characteristics• provide one service or function• distributed database• API gateway• central repository for code• configuration database• uses session managementWhich two design approaches contribute to the scalability of the application'? (Choose two)
A. built to scale based on a star topology
B. modular design iteration
C. session management in a stateless architecture
D. planned before the first device is deployed
E. distributed computing with tightly coupled components
Which Puppet manifest changes the NTP server and generates the traffic from VLAN 15?A)
A. Option A
B. Option B
C. Option C
D. Option D
A web application is being developed to provide online sales to a retailer. The customerswill need to use their username and passwords to login into then profile and complete theirorder For this reason the application must store user passwords Which approach ensuresthat an attacker wifi need to crack the passwords one at a time?
A. Apply the peppering technique
B. Store the passwords by using asymmetric encryption
C. Apply the salting technique
D. Store the passwords by using symmetric encryption
How is AppDynamics used to instrument an application?
A. Provides visibility into the transaction logs that can be correlated to specific businesstransaction requests
B. Enables instrumenting a backend web server (or packet installation by using anAppDynamics agent
C. Retrieves a significant amount of information from the perspective of the databaseserver by using application monitoring
D. Monitors traffic flows by using an AppDynamics agent installed on a networkinfrastructure device
Refer to the exhibit. The application follows a containerized microservices architecture that has one containerper microservice. The microservices communicate with each other by using REST APIsThe double-headed arrows m the diagram display chains of synchronous HTTP callsneeded for a single use/request Which action ensures the resilience of the application inthe scope of a single user request'
A. Redesign the application to be separated into these three layers Presentation. API. and Data
B. Implement retries with exponential backoff during HTTP API calls
C. Set up multiple instances of each microservice m active/active mode by using the Orchestrator
D. Create two virtual machines that each host an instance of the application and set up a cluster