Month End Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmaspas7

Easiest Solution 2 Pass Your Certification Exams

350-901 Cisco Developing Applications using Cisco Core Platforms and APIs (DEVCOR) Free Practice Exam Questions (2025 Updated)

Prepare effectively for your Cisco 350-901 Developing Applications using Cisco Core Platforms and APIs (DEVCOR) certification with our extensive collection of free, high-quality practice questions. Each question is designed to mirror the actual exam format and objectives, complete with comprehensive answers and detailed explanations. Our materials are regularly updated for 2025, ensuring you have the most current resources to build confidence and succeed on your first attempt.

Page: 4 / 6
Total 434 questions

AppGigabitEthernet interface is used as data port for a container on a Cisco Catalyst 9000 Series Switch. Which two interface configuration options should be used? (Choose two.)

A.

trunk interface

B.

bridged virtual interface

C.

SPAN port

D.

management interface

E.

subinterface

Refer to the exhibit. A developer must create a new network object named testnetwork by using the Cisco Firepower Device Management API. The script must also handle any exceptions that occur during the request and print out any resulting errors. Which script must be used?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Refer to the exhibit.

Which AP! call does an engineer use to delete the FQDN object?

A.

DELETE /api/fmc_config/v1/domain/e276abec-e0f2-11e3-8169-6d9ed49b625f

B.

DELETE /api/fmc_config/v1/domain/e276abec-e0f2-11e3-8169-6d9ed49b625f/object/fqdns/005056BB-0B24-0ed3-0000-858993545263

C.

DELETE /api/fmc_config/v1/domain?id=e276abec-e0f2-11e3-8169-6d9ed49b625f

D.

DELETE /api/fmc_config/v1/domain/e276abec-e0f2-11e3-8169-6d9ed49b625f/object/fqdns?id=005056BB-0B24-0ed3-0000-858993545263

What is a consideration for using gRPC as the model-driven telemetry protocol on a Cisco IOS XE device?

A.

XML-based transmission format

B.

works in dial-out mode

C.

human-readable transmission format

D.

works in call-out mode

Which two techniques protect against injection attacks? (Choose two.)

A.

input validation

B.

trim whitespace

C.

limit text areas to 255 characters

D.

string escaping of user free text and data entry

E.

only use dropdown, checkbox, and radio button fields

An architect must optimize traffic that targets a popular API endpoint Currently, the application downloads a large file hourly, but often the file is unchanged and the download causes unnecessary load and delays Which cURL command must be used to determine the last modified date of the file and to optimize the API usage?

A.

curl GET request

B.

curl HEAD request

C.

curl --silent request

D.

curl -H 'Cache-Control: no-cache' request

An engineer needs to configure an interface named GigabitEthernet3 with an IP address on several RESTCONF-enabled Cisco IOS XE devices. Which code snippet must be placed in the blank in the code to meet this requirement?

A.

(item["name"])'

B.

(item["name"])/ip/addres3

C.

item["name"]:/ip/address/primary'

D.

(ltemt"name"]} /ip

An organization manages a large cloud-deployed application that employs a microservices architecture across multiple data centers. Reports have received about application slowness. The container orchestration logs show that faults have been raised in a variety of containers that caused them to fail and then spin up brand new instances.

Which two actions can improve the design of the application to identify the faults? (Choose two.)

A.

Automatically pull out the container that fails the most over a time period.

B.

Implement a tagging methodology that follows the application execution from service to service.

C.

Add logging on exception and provide immediate notification.

D.

Do a write to the datastore every time there is an application failure.

E.

Implement an SNMP logging system with alerts in case a network link is slow.

An application is hosted on Google Kubernetes Engine. A new JavaScript module is created to work with the existing application. Which task is mandatory to make the code ready to deploy?

A.

Create a Dockerfile for the code base.

B.

Rewrite the code in Python.

C.

Build a wrapper for the code to “containerize” it.

D.

Rebase the code from the upstream git repo.

Refer to the exhibit , The command docker build -tag=friendlyhello . is run to build a docker image from the given Dockerfile,

requirements,txt, and app.py, Then the command docker run -p 4000:80 friendlyhello is executed to run the application. Which URL is entered in the web browser to see the content served by the application?

A.

http://localhost:4000

B.

http ://localhost:80

C.

http ://127.0.0.1:80

D.

http:///4000:80

Refer to the exhibits. An interface named “GigabitEthernet2” has been configured on a Cisco IOS XE device. Using RESTCONF APIs as defined by the ietf-interfaces@2014-05-08.yang model, which two combinations of “rest_operation” and “payload” must be added to the Python script to set the “description” to “Configured by RESTCONF”? (Choose two.)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

E.

Option E

How is client code that consumes gRPC telemetry implemented, assuming that the preferred language is able to be chosen?

A.

Parse the OpenAPI spec model

B.

Compile the protocol buffers IDL

C.

Leverage a Thrift code generator to parse a Thrift IDL

D.

Review the Swagger API documentation to build client code

Refer to the exhibit.

Drag and drop the code from the bottom onto the box where the code is missing to construct a Python script that will retrieve location data Not all options are used.

Refer to the exhibit.

One part of an application routinely uses the Cisco Meraki API to collate data about all clients Other parts of the application also use the Meraki API, but a single API key is used within the application The organization has approximately 4.000 clients across 30 networks Some of the application users report poor performance and missing data. Which two changes improve the performance of the application? (Choose two.)

A.

Check for HTTP code 429 and wait until Retry-After time before further calls are made

B.

Configure multiple API keys in the application and rotate usage of each one.

C.

Use random values in the User-Agent header when HTTP calls are made.

D.

Use fewer API calls to create a more efficient endpoint.

E.

Check API response payloads for later reuse in real time during code execution.

Drag and drop the operations from the left into the order on the right to create a web dashboard that displays Cisco DNA Center data for an organization.

{'lat': 37.4180951010362, 'lng': -122.098531723022, 'address': '', 'serial': 'Q2HP-F5K5-F98Q',

'mac': '88:15:44:ea:f5:bf', 'lanIp': '10.10.10.15',

'url': 'https://n149.meraki.com/DevNet-Sandbox/n/EFZDavc/manage/nodes/new_list/78214561218351',

'model': 'MS220-8P', 'switchProfileId': None, 'firmware': 'switch-11-31', 'floorPlanId': None}

Refer to the exhibit. A developer needs to find the geographical coordinates of a device on the network L_397561557481105433 using a Python script to query the Meraki API. After running response = requests.get() against the Meraki API, the value of response.text is shown in the exhibit.

What Python code is needed to retrieve the longitude and latitude coordinates of the device?

A.

latitude = response.text['lat']

longitude = response.text['lng']

B.

latitude = response.json()['lat']

longitude = response.json()['lng']

C.

latitude = response.json()[0]

longitude = response.json()[1]

D.

latitude = response.text[0]

longitude = response.text[1]

What is the unique identifier in the 0Auth2 three-legged authorization code flow?

A.

client ID

B.

resource server

C.

resource owner

D.

authorization server

Refer to the exhibit.

An engineer needs to implement REST API error handling when a timeout or rate limit scenario is present. Which code snippet must be placed into the blank in the code to complete the API request?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

A developer has just completed the configuration of an API that connects sensitive internal systems. Based on company policies, the security of the data is a high priority.

Which approach must be taken to secure API keys and passwords?

A.

Embed them directly in the code.

B.

Store them in a hidden file.

C.

Store them inside the source tree of the application.

D.

Change them periodically.

Drag and drop the code from the bottom onto the box where the code is missing the snippet to complete this Ansible Playbook. Not all options are used.

Page: 4 / 6
Total 434 questions
Copyright © 2014-2025 Solution2Pass. All Rights Reserved