Lead4Pass has released the latest CCDP(“Cisco Certified DevNet Professional”)/CCDE(“Cisco Certified DevNet Expert”) 350-901 exam dumps, including 359 exam questions and answers, and all difficult problems analysis!
Moreover, Lead4Pass 350-901 dumps come with two exam study types: 350-901 dumps PDF, and 350-901 dumps VCE, both types contain the latest 350-901 exam questions that can help you pass the 350-901 DEVCOR successfully Certification exam!
Now, get the latest 350-901 dumps in PDF or VCE format from Lead4Pass: https://www.leads4pass.com/350-901.html (99.5% pass rate).
(PDF and VCE) preview:
PDF Free Download – Part of the Lead4Pass 350-901 dumps: https://drive.google.com/file/d/1Z66Uo5DSzTgNfyh3YiTWCd-T9I2f2Xwz/
Online Practice – Part of Lead4Pass 350-901 dumps:
Type | Number of exam questions | Exam name | Exam code | Verify answer |
Free | 15 | Developing Applications Using Cisco Core Platforms and APIs (DEVCOR) | 350-901 | View |
Question 1:
Which transport layer protocol does gRPC use to retrieve telemetry information?
A. SSH
B. SNMP
C. TCP
D. HTTP/2
Question 2:
DRAG DROP
Click on the resource tab in the top left comer to view resources to help with this question.
An engineer is managing a data center with 6000 Cisco UCS servers installed and running The engineer is asked to identify all resources where the model is in the UCSB family and the available memory is less than or equal to 5 GB Drag
and drop the code from the bottom onto the blanks in the code snippet to construct a REST API call to accomplish this task. Not all options are used.
Select and Place:
Correct Answer:
Question 3:
Refer to the exhibits. An interface named “GigabitEthernet2” has been configured on a Cisco IOS XE device. Using RESTCONF APIs as defined by the ietf-interfaces@2014-05- 08. yang model, two combinations of “rest_operation” and “payload” must be added to the Python script to set the “description” to “Configured by RESTCONF”? (Choose two.)
A. Option A
B. Option B
C. Option C
D. Option D
E. Option E
Question 4:
Refer to the exhibits which show the documentation associated with the create port object API call in Cisco Firepower Threat Defense, and a cURL command. Which data payload completes the cURL command to run the API call?
A. B. C. D.
Reference : https://developer.cisco.com/site/ftd-api- reference/#!editicmpv4portobject/path-parameters
Question 5:
Which two types of storage are supported for app hosting on a Cisco Catalyst 9000 Series Switch? (Choose two.)
A. external USB storage
B. internal SSD
C. CD-ROM
D. SD-card
E. bootflash
Question 6:
DRAG DROP
Refer to the exhibit.
Drag and drop the code from the bottom onto the box where the code is missing to complete the API request. An engineer is using this API request to implement Chat-Ops to generate notifications m a Webex space by using webhooks. Not all options are used.
Select and Place:
Correct Answer:
Question 7:
A team of developers created their own CA and started signing certificates for all of their loT devices. Which action will make the browser accept these certificates?
A. Set the private keys to 1024-bit RSA.
B. Preload the developer CA on the trusted CA list of the browser.
C. Enable HTTPS or port 443 on the browser.
D. install a TLS instead of an SSL certificate on the loT devices.
Question 8:
A developer is working on an enhancement for an application feature and has made changes to a branch called `decor-432436127a-enhance4`. When merging the branch to production, conflicts occurred. Which Git command must the developer use to recreate the pre-merge state?
A. git merge -no-edit
B. git merge -abort
C. git merge -revert
D. git merge –commit
Explanation: This command will recreate the pre-merge state, reverting any changes made to the branch before the merge.
Question 9:
What is the benefit of continuous testing?
A. decreases the frequency of code check-ins
B. removes the requirement for test environments
C. enables parallel testing
D. increases the number of bugs found in production
Question 10:
An enterprise refactors its monolithic application into a modem cloud-native application that is based on microservices. A key requirement of the application design is to ensure that the IT team is aware of performance issues or bottlenecks in
the new application.
Which two approaches must be part of the design considerations\’\’ (Choose two.)
A. Periodically scale up the resources of the host machines when the application starts to experience high loads
B. Instrument the application code to gather telemetry data from logs, metrics or tracing
C. Adopt a service-oriented architecture to handle communication between the services that make up the application
D. Deploy infrastructure monitoring agents into the operating system of the host machines
E. Implement infrastructure monitoring to ensure that pipeline components interoperate smoothly and reliably
Question 11:
Users report that they are no longer able to process transactions with the online ordering application, and the logging dashboard is displaying these messages: Fri Jan 10 19:37:31.123 ESI 2020 [FRONTEND] [NFO: Incoming request to add the item to cart from user 45834534858 Fri Jan 10 19:37:31.247 EST 2020 [BACKEND] INFO: Attempting to add the item to cart Fri Jan 10 19:37:31.250 EST 2020 [BACKEND] ERROR: Failed to add an item: MYSQLDB ERROR: Connection refused What is causing the problem seen in these log messages?
A. The database server container has crashed.
B. The backend process is overwhelmed with too many transactions.
C. The backend is not authorized to commit to the database.
D. The user is not authorized to add the item to their cart.
Question 12:
DRAG DROP
Drag and drop the code from the bottom onto the box where the code is missing to stop the REST API requests if a \’Too Many Requests” response is received. Not all options are used.
Select and Place:
Correct Answer:
Question 13:
Which two methods are API security best practices? (Choose two.)
A. Use tokens after the identity of a client has been established.
B. Use the same operating system throughout the infrastructure.
C. Use encryption and signatures to secure data.
D. Use basic auth credentials for overall internal API interactions.
E. Use cloud hosting services to manage security configuration.
Question 14:
Where must the data be encrypted to ensure end-to-end encryption when using an API?
A. on the device that consumes the API
B. on the source device before transmission
C. on the end device after a request is received
D. on the server that stores the data
Question 15:
Refer to the exhibit.
An Intersight API is being used to query RackUnit resources that have a tag keyword set to “Site”. What is the expected output of this command?
A. list of all resources that have a tag with the keyword “Site”
B. error message because the Value field was not specified
C. error message because the tag filter should be lowercase
D. a list of all sites that contain RackUnit tagged compute resources
Verify answer:
Number: | Q1 | Q2 | Q3 | Q4 | Q5 | Q6 | Q7 | Q8 | Q9 | Q10 | Q11 | Q12 | Q13 | Q14 | Q15 |
Answers: | D | IMAGE | AB | C | AB | IMAGE | B | B | C | BE | A | IMAGE | AC | A | A |
You’ve already enjoyed two premium perks, although they’re only part of the Lead4Pass 350-901 dumps!
Therefore, it is recommended to download PDF or VCE study Lead4Pass 350-901 dumps to help you easily pass the 350-901 DEVCOR certification exam: https://www.leads4pass.com/350-901.html (359 Q&A).