Weekend Special Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

350-901 Exam Dumps - Developing Applications using Cisco Core Platforms and APIs (DEVCOR)

Go to page:
Question # 25

A cloud native project is being worked on in which all source code and dependencies are written in Python, Ruby, and/or JavaScipt. A change in code triggers a notification to the CI/CD tool to run the CI/CD pipeline.

Which step should be omitted from the pipeline?

A.

Deploy the code to one or more environments, such as staging and/or production.

B.

Build one of more containers that package up code and all its dependencies.

C.

Compile code.

D.

Run automated tests to validate the correctness.

Full Access
Question # 26

A developer plans to create a new bugfix branch to fix a bug that was found on the release branch. Which command completes the task?

A.

git checkout -b RELEASE BUGFIX

B.

git checkout -t BUGF1X RELEASE

C.

git checkout -b BUG FIX RELEASE

D.

git checkout -t RELEASE BUGFIX

Full Access
Question # 27

What is a benefit of implementing a Cl pipeline?

A.

enforces version control

B.

enables a faster feedback loop

C.

ensures that tests are written before code is written

D.

decreases external dependencies

Full Access
Question # 28

Refer to the exhibit.

A company has extended networking from the data center to the cloud through Transit VPC.

Which two statements describe the benefits of this approach? (Choose two.)

A.

Dynamic routing combined with multi-AZ- deployment creates a robust network infrastructure.

B.

VPC virtual gateways provide highly available connections to virtual networks.

C.

Dedicated VPC simplifies load balancing by combining internal and external web services.

D.

VPC virtual gateways provide more secure connections to virtual networks.

E.

Dedicated VPC simplifies routing by not combining this service with other shared services.

Full Access
Question # 29

While working with the Webex Teams API, on an application that uses end-to-end encryption, a webhook has

been received. What must be considered to read the message?

A.

Webhook information cannot be used to read the message because of end-to-end encryption. The API key

is needed to decrypt the message.

B.

Webhook returns the full unencrypted message. Only the body is needed to query the API.

C.

Webhook returns a hashed version of the message that must be unhashed with the API key.

D.

Webhook returns message identification. To query, the API is needed for that message to get the decrypted

information.

Full Access
Question # 30

Which two countermeasures help reduce the risk of playback attacks? (Choose two.)

A.

Store data in a NoSQL database.

B.

Implement message authentication (HMAC).

C.

Enable end-to-end encryption.

D.

Remove stack traces from errors.

E.

Use short-lived access tokens.

Full Access
Question # 31

A local Docker image has an image ID of 386231131. Fill in the blanks to complete the command in order to tag the image into the "cisco" repository with "version1 0’".

Full Access
Question # 32

Refer to the exhibits. An interface named “GigabitEthernet2” has been configured on a Cisco IOS XE device. Using RESTCONF APIs as defined by the ietf-interfaces@2014-05-08.yang model, which two combinations of “rest_operation” and “payload” must be added to the Python script to set the “description” to “Configured by RESTCONF”? (Choose two.)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

E.

Option E

Full Access
Go to page: