Weekend Special Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

350-901 Exam Dumps - Developing Applications using Cisco Core Platforms and APIs (DEVCOR)

Go to page:
Question # 33

Refer to the exhibit.

The cisco_devnet Docker swarm service runs across five replicas The development team tags and imports a new image named devnet'test 1 1 and requests that the image be upgraded on each container There must be no service outages during the upgrade process Which two design approaches must be used? (Choose two.)

A.

Implement rolling upgrades by using the docker service update command.

B.

Enable parallel upgrades by using the docker service update command.

C.

Ensure that the service is hosted behind a VIP with no session persistence.

D.

Update the restart policy of the containers to restart upon failure.

E.

Ensure that the service replicas are set to a minimum of 5

Full Access
Question # 34

A developer is deploying an application to automate the configuration and management of Osco network files and routers The application must use REST API interface lo achieve programmability. The security team mandates that the network must be protected against DDoS attacks What mitigates the attacks without impacting genuine requests?

A.

API rate limiting at the application layer

B.

IP address filtering at the application layer

C.

traffic routing on the network perimeter

D.

firewall on the network perimeter

Full Access
Question # 35

Drag and drop the code from the bottom onto the box where the code is missing to create a new IKEv2 policy Not all options are used

Full Access
Question # 36

Refer to the exhibit.

An application is created to serve the needs of an enterprise. Slow performance now impacts certain API calls, and the application design lacks observability. Which two commands improve observability and provide an output that is similar to the sample output? (Choose two.)

A)

B)

C)

D)

E)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

E.

Option E

Full Access
Question # 37

Refer to the exhibit. Which URI string retrieves configured static routes in a VRF named CUSTOMER from a RESTCONF-enabled device?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 38

When end-to-end encryption is implemented, which area is most vulnerable to exploitation?

A.

cryptographic key exchange

B.

endpoint security

C.

cryptographic key generation

D.

security of data in transit

Full Access
Question # 39

A Cisco Catalyst 9000 switch has guest shell enabled. Which Linux command installs a third-party application?

A.

yum Install

B.

apt-get install

C.

zypper install

D.

dnf install

Full Access
Question # 40

Where should distributed load balancing occur in a horizontally scalable architecture?

A.

firewall-side/policy load balancing

B.

network-side/central load balancing

C.

service-side/remote load balancing

D.

client-side/local load balancing

Full Access
Go to page: