Weekend Special Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

350-901 Exam Dumps - Developing Applications using Cisco Core Platforms and APIs (DEVCOR)

Go to page:
Question # 9

Refer to the exhibit.

An engineer needs to implement REST API error handling when a timeout or rate limit scenario is present. Which code snippet must be placed into the blank in the code to complete the API request?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 10

A web application is being developed to provide online sales to a retailer. The customers will need to use their username and passwords to login into then profile and complete their order For this reason the application must store user passwords Which approach ensures that an attacker wifi need to crack the passwords one at a time?

A.

Apply the peppering technique

B.

Store the passwords by using asymmetric encryption

C.

Apply the salting technique

D.

Store the passwords by using symmetric encryption

Full Access
Question # 11

Drag and drop the code from the bottom onto the box where the code is missing in the diagram to show how data is processed in Webex Teams. Not all options are used.

Full Access
Question # 12

Drag and drop the code from the bottom onto the where the code is missing to create a host object by using the Cisco Firepower Device Manager API. Not all options are used.

Full Access
Question # 13

Refer to the exhibit.

Refer to the exhibit A Docker swarm service is currently running m a local data center The service is hosting an HTML website it the container fads then the service becomes unavailable The design must meet these requirements

• The service must be highly available and resilient against a data center outage.

• The service must be accessible from a single URL

• The HTTP session must remain on the server from which the original request was sent

• Failure of the server must force the client to reconnect

Which two design approaches must be used to meet the requirements? (Choose two.)

A.

Create another swarm cluster within a data center and deploy a secondary instance of the service.

B.

Create another node in the swarm duster to scale the service across the nodes over two replicas.

C.

Configure an external load balancer to route requests to the swarm service by using session persistence

D.

Scale the Docker swarm service to 2 and set endpoint-mode to DNSRR instead of the default value of VIP

E.

Configure a routing mesh to route requests to the swarm service by using NAT on the network side

Full Access
Question # 14

A Python script must query the Cisco DNA center API for the number of unique wireless clients that are exhibiting poor health behavior. Drag and drop the code from the bottom onto the box where the code is missing to complete the script Not all options are used.

Full Access
Question # 15

What is an effective logging strategy according 10 the 12-factor app tenets?

A.

Capture togs by the execution environment and route to a centralized destination

B.

Tag and save togs in a local document database that has querying capabilities.

C.

Back up log files in a high-availability remote cluster on the public cloud

D.

Timestamp and save logs in a local time-series database that has querying capabilities

Full Access
Question # 16

Refer to the exhibit. The presented application consists of a Nginx container and a load balancer service. Which GitLab CI/CD configuration implements the Kubernetes deployment?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Go to page: