Month End Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmaspas7

Easiest Solution 2 Pass Your Certification Exams

350-901 Cisco Developing Applications using Cisco Core Platforms and APIs (DEVCOR) Free Practice Exam Questions (2025 Updated)

Prepare effectively for your Cisco 350-901 Developing Applications using Cisco Core Platforms and APIs (DEVCOR) certification with our extensive collection of free, high-quality practice questions. Each question is designed to mirror the actual exam format and objectives, complete with comprehensive answers and detailed explanations. Our materials are regularly updated for 2025, ensuring you have the most current resources to build confidence and succeed on your first attempt.

Page: 1 / 6
Total 434 questions

Click on the GET Resource button above to view resources that will help with this question. An engineer is managing a DC with 6000 Cisco UCS servers installed and running. The engineer has been asked to identify all resources where the model is in the UCSB family and the available memory is less than or equal to 5 GB. Which REST API call accomplishes this task?

A.

GET/api/v1/compute/RackUnits?$select=Vendor,Model,Serial&$filter=not(Model eq ‘UCSC’) and AvailableMemory le 5000

B.

GET/api/v1/compute/RackUnits?$select=Vendor,Model,Serial&$filter=Model eq ‘UCSB’ and AvailableMemory lt 5000

C.

GET/api/v1/compute/RackUnits?$select=Vendor,Model,Serial&$filter=contains(Model, UCSB’) and AvailableMemory lt 5000

D.

GET/api/v1/compute/RackUnits?$select=Vendor,Model,Serial&$filter=contains(Model, UCSB’) and AvailableMemory le 5000

A user is receiving a 429 Too Many Requests error. Which scheme is the server employing that causes this error?

A.

rate limiting

B.

time outs

C.

caching

D.

redirection

Click on the resource lab in the top left comer to view resources to help with this question An engineer is managing a data center with 6000 Cisco UCS servers installed and running The engineer is asked to identify all resources where the model is in the UCSB family and the available memory is less than or equal to 5 GB Drag and drop the code from the bottom onto the blanks in the code snippet to construct a REST API call to accomplish this task Not all options are used.

A developer must deploy a containerized application foe network device inventory management. The developer sets up a Kubernetes duster on two separate hypervisors. The SLA is not currently meeting a specified maximum value for network latencyjitter CPU/memory and disk I/O are functioning property. Which two design approaches resolve the issue'' (Choose two.)

A.

Colocate services in the same pod

B.

Replace the HDD drives with SSD drives

C.

Enable IPv6 within the duster

D.

Deploy the duster to a bare metal server

E.

Upgrade the server NIC card

What securely stores and encrypts the API keys and tokens that are used for an application deployment?

A.

ITSM

B.

Artifactory

C.

GitHub

D.

Vault

Application sometimes store configuration as constants in the code, which is a violation of strict separation of configuration from code. Where should application configuration be stored?

A.

environment variables

B.

YAML files

C.

Python libraries

D.

Dockerfiles

E.

INI files

Refer to the exhibit.

Drag and drop the components from the Oauth2 authorization protocol flow on the left onto the letter that matches the location in the exhibit.

A developer wants to automate virtual infrastructure to provision and manage it. The system will be implemented m large-scale deployment while offering redundancy and scalability with ease of management The solution must meet these requirements:

• Support the provisioning of up to 500 new virtual machines into private datacenters or the public cloud

• Support the modeling of a complex environment that consists of multiple virtual machines while supporting disaster recovery

• Maintain steady-state environments

Which configuration management solution must the developer use?

A.

Puppet

B.

Terraform

C.

Docker

D.

Arable

Refer to the exhibit.

The application follows a containerized microservices architecture that has one container per microservice. The microservices communicate with each other by using REST APIs The double-headed arrows m the diagram display chains of synchronous HTTP calls needed for a single use/request Which action ensures the resilience of the application in the scope of a single user request?

A.

Redesign the application to be separated into these three layers Presentation. API. and Data

B.

Implement retries with exponential backoff during HTTP API calls

C.

Set up multiple instances of each microservice m active/active mode by using the Orchestrator

D.

Create two virtual machines that each host an instance of the application and set up a cluster

Refer to the exhibit.

This script uses ciscoyang to configure two VRF instances on a Cisco IOS-XR device using the Yang NETCONF type.

Which two words are required to complete the script? (Choose two.)

A.

ensure

B.

commit

C.

false

D.

replace

E.

none

How is AppDynamics used to instrument an application?

A.

Provides visibility into the transaction logs that can be correlated to specific business transaction requests

B.

Enables instrumenting a backend web server (or packet installation by using an AppDynamics agent

C.

Retrieves a significant amount of information from the perspective of the database server by using application monitoring

D.

Monitors traffic flows by using an AppDynamics agent installed on a network infrastructure device

Drag and drop the code from the bottom onto the box where the code is missing to provision a new Cisco Unified Computing System server by using the UCS XML API. Options may be used more than once. Not all options are used.

Refer to the exhibit.

A network engineer writes a script to test authentication workflow using Python and REST API. The engineer wants to ensure that the script handles expected errors by matching output to HTTP status codes The scnpt uses the Python requests module. Which line of code must be added on the snippet where the code is missing?

A.

requests.error_code

B.

response.sutus_code

C.

response

D.

requests.post

Drag and drop the code from the bottom onto the box where the code is missing to enable an SSID by using the Cisco Meraki Dashboard API. Not all options are used.

Drag and drop the code from the bottom onto the where the code is missing to create a host object by using the Cisco Firepower Device Manager API. Not all options are used.

An engineer needs to automate the configuration on a Cisco NX-OS switch. The solution must meet these requirements:

•Ansible is used

•The transport protocol is encrypted

•Support for Asynchronous requests.

Which two access mechanisms must be used? (Choose two.)

A.

SNMP Version 2c

B.

NETCONF

C.

NX-API

D.

HTTPS

E.

JSON-RPC

Drag and drop the REST API authentication method from the left to the description on the right

Refer to me exhibit The Python code manages a Cisco CSR 1000V router Which code snippet must be placed in the blank m the code to update the current configuration of the targeted resource?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Refer to the exhibit.

A company has extended networking from the data center to the cloud through Transit VPC.

Which two statements describe the benefits of this approach? (Choose two.)

A.

Dynamic routing combined with multi-AZ- deployment creates a robust network infrastructure.

B.

VPC virtual gateways provide highly available connections to virtual networks.

C.

Dedicated VPC simplifies load balancing by combining internal and external web services.

D.

VPC virtual gateways provide more secure connections to virtual networks.

E.

Dedicated VPC simplifies routing by not combining this service with other shared services.

Drag and drop the expressions from below onto the code to implement error handling. Not all options are used.

Page: 1 / 6
Total 434 questions
Copyright © 2014-2025 Solution2Pass. All Rights Reserved