Month End Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmaspas7

Easiest Solution 2 Pass Your Certification Exams

350-901 Cisco Developing Applications using Cisco Core Platforms and APIs (DEVCOR) Free Practice Exam Questions (2025 Updated)

Prepare effectively for your Cisco 350-901 Developing Applications using Cisco Core Platforms and APIs (DEVCOR) certification with our extensive collection of free, high-quality practice questions. Each question is designed to mirror the actual exam format and objectives, complete with comprehensive answers and detailed explanations. Our materials are regularly updated for 2025, ensuring you have the most current resources to build confidence and succeed on your first attempt.

Page: 5 / 6
Total 434 questions

A developer must create VLANs 2-5 on a remote Cisco NX-OS switch by using an Ansible playbook The playbook must meet these requirements

• Configure the VLANs and a name for each VLAN

• Only run against the switches inventory group

• Execute from the local Ansible controller

• Prevent the collection of system information prior to execution

Which playbook must be used?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Drag and drop the descriptions from the left onto the related OAuth-defined roles on the right.

A developer must deploy a containerized application for network device inventory management. The developer sets up a Kubernetes cluster on two separate hypervisors The SLA is not currently meeting a specified maximum value for network latency/jitter. CPU/memory and disk 1,0 are functioning property.

Which two design approaches resolve the issue? (Choose two.)

A.

Upgrade the server NIC card.

B.

Colocate services in the same pod.

C.

Enable IPv6 within the cluster

D.

Replace the HDD drives with SSD drives.

E.

Deploy the cluster to a bare metal server.

Refer to the exhibit.

The cURL POST request creates an OAuth access token for authentication with FDM API requests. What is the purpose of the file “@token_data” that cURL is handling?

A.

This file is a container to log possible error responses in the request.

B.

This file is given as input to store the access token received from FDM.

C.

This file is used to send authentication related headers.

D.

This file contains raw data that is needed for token authentication.

Which RFC5988 (Web Linking) relation type is used in the Link header to control pagination in APIs?

A.

rel=”index”

B.

rel=”page”

C.

rel=”next”

D.

rel=”section”

Refer to the exhibit.

Which action will complete the workflow that represents how an API call sends multiple messages?

A.

{PUT} messages(roomID)

B.

{PUT} messages(BearerToken)

C.

{POST} messages(roomID)

D.

{POST} messages(BearerToken)

Refer to the exhibit.

An application is being developed as an information repository. The application will be used to store details about television shows, including the scenario, year, and category. Which database type must used for high performance for the data structure?

A.

time series

B.

Eidocument-based

C.

graph

D.

columnar

Drag and drop the code snippets from the bottom onto the boxes where the code is missing to complete the API call to implement error handling Not all options are used.

What is submitted when an SSL certificate is requested?

A.

PEM

B.

CRT

C.

DER

D.

CSR

Which command is used 10 enable application hosting on a Cisco IOS XE device?

A.

iox

B.

iox-service

C.

application -honing

D.

app- hosting

Where should distributed load balancing occur in a horizontally scalable architecture?

A.

firewall-side/policy load balancing

B.

network-side/central load balancing

C.

service-side/remote load balancing

D.

client-side/local load balancing

Refer to the exhibit.

Drag and drop the steps from the left into the order of operation on the right for a successful OAuth2 three-legged authorization code grant flow,

Which function does Fluentd fulfill for application logging in Kubernetes?

A.

logging agent for distribution

B.

backend time series database storage

C.

monitoring and log visualization

D.

messaging queueig infrastructure

Refer to the exhibit.

Which parameter is missing from the JSON response to confirm the API version that is

used?

A.

version 4

B.

v 10

C.

2

D.

version 2

Refer to the exhibit.

An engineer creates an application that leverages the Ansible framework to provision CPE endpoints that have configuration changes. The application contains an Ansible playbook named provision_cpes.yml that uses the ansible.builtin.script Ansible module to execute these two Python scripts:

•gather and_create.py. which creates a JSON file named bios.json that contains the CPE models and their respective IOS file information

•load and parse.py. which loads the file data and parses it for later consumption

After several successful runs, the application fails. During a review of the Ansible execution logs, the engineer discovers an error output that indicates that one of the stages failed. What is the cause of this issue?

A.

ansible builtm script Ansible module

B.

gather and create.py Python script

C.

load_and_parse.py Python script

D.

provision cpes.yml Ansibte playbook

Which configuration stop must be performed on a Cisco IOS XE device to present collected data in Cisco DNA Center?

A.

Create an SNMPv3 user account.

B.

Apply a telemetry profile.

C.

Synchronize the device and the data collector.

D.

Enable Cisco NetFlow collection.

What is a characteristic of event-driven architecture?

A.

separates the models for the reading and writing of data

B.

allows for loose coupling between software components

C.

breaks a solution into parts according to business capability

D.

provides a single point of reference for mastering data

What are two building blocks of the 12-factor app? (Choose two.)

A.

Stateful Processes

B.

Easy access to underlying systems

C.

Dev and Prod must be different

D.

One codebase

E.

Isolated Dependencies

Drag and drop the code from the bottom onto the box where the code is missing on the Ansible task to enable a VLAN on a Meraki MX Device, Not all options are used.

Refer to the exhibit.

A developer created a Python script to retrieve interface information for the devices in a MeraKi network environment. A security analyst has reviewed the code and observed poor secret storage practices. What is the appropriate password storage approach?

A.

Set the Base64 encoded version of the API key as MER_API_KEY in the code and Base64 decode before using in the header.

B.

Set an OS environment variable for MER_API_KEY to the API key during running the code and longer set MER_API_KEY within the code.

C.

Create a secret for the API key, set MER_API_KEY using the value from the secret in the Pod. and no longer set MER_API_KEY within the code.

D.

Leverage an external secret vault to retrieve MER_API_KEY and embed the vault key as a new variable before running the code.

Page: 5 / 6
Total 434 questions
Copyright © 2014-2025 Solution2Pass. All Rights Reserved