350-901 Dumps

350-901 Braindumps

350-901 Real Questions

350-901 Practice Test

350-901 Actual Questions


killexams.com


Cisco


350-901


Developing Applications using Cisco Core Platforms and APIs (DEVCOR)


https://killexams.com/pass4sure/exam-detail/350-901

Question: 303


Which statement about microservices architecture is true?

  1. Applications are written in a single unit.

  2. It is a complex application composed of multiple independent parts.

  3. It is often a challenge to scale individual parts.

  4. A single faulty service can bring the whole application down.


Answer: B


Question: 304


Application sometimes store configuration as constants in the code, which is a violation of strict separation of configuration from code.


Where should application configuration be stored?

  1. environment variables

  2. YAML files

  3. Python libraries

  4. Dockerfiles

  5. INI files


Answer: B


Question: 305


Which two methods are API security best practices? (Choose two.)

  1. Use tokens after the identity of a client has been established.

  2. Use the same operating system throughout the infrastructure.

  3. Use encryption and signatures to secure data.

  4. Use basic auth credentials over all internal API interactions.

  5. Use cloud hosting services to manage security configuration.


Answer: AC Question: 306 DRAG DROP

Drag and drop the steps from the left into the correct sequence on the right to describe how to use Git to maintain the current HEAD and revert back to a previous commit, while undoing all intermediate commits.



Answer:


Question: 307


Refer to the exhibit.


The cURL POST request creates an OAuth access token for authentication with FDM API requests. What is the purpose of the file “@token_data” that cURL is handling?

  1. This file is a container to log possible error responses in the request.

  2. This file is given as input to store the access token received from FD

  1. This file is used to send authentication related headers.

  2. This file contains raw data that is needed for token authentication.


Answer: B


Question: 308


A user is receiving a 429 Too Many Requests error.


Which scheme is the server employing that causes this error?

  1. rate limiting

  2. time outs

  3. caching

  4. redirection


Answer: A


Question: 309


Which two situations are flagged by software tools designed for dependency checking in continuous integration environments, such as OWASP? (Choose two.)

  1. publicly disclosed vulnerabilities related to the included dependencies

  2. mismatches in coding styles and conventions in the included dependencies

  3. incompatible licenses in the included dependencies

  4. test case failures introduced by bugs in the included dependencies

  5. buffer overflows to occur as the result of a combination of the included dependencies


Answer: AE


Question: 310


Which two data encoding techniques are supported by gRPC? (Choose two.)

  1. XML

  2. JSON

  3. ASCII

  4. ProtoBuf

  5. YAML


Answer: BE


Question: 311


An organization manages a large cloud-deployed application that employs a microservices architecture across multiple data centers. Reports have received about application slowness. The container orchestration logs show that faults have been raised in a variety of containers that caused them to fail and then spin up brand new instances.

Which two actions can improve the design of the application to identify the faults? (Choose two.)

  1. Automatically pull out the container that fails the most over a time period.

  2. Implement a tagging methodology that follows the application execution from service to service.

  3. Add logging on exception and provide immediate notification.

  4. Do a write to the datastore every time there is an application failure.

  5. Implement an SNMP logging system with alerts in case a network link is slow.


Answer: BC Question: 312 DRAG DROP

Drag and drop the git commands from the left into the correct order on the right to create a feature branch from the master and then incorporate that feature branch into the master.


Answer:



Question: 313


DRAG DROP


Refer to the exhibit.


Drag and drop parts of the URL from the left onto the item numbers on the right that match the missing sections in the exhibit to create the appropriate RESTCONF URL to query the VLAN configuration given this YANG model. Not all URL parts are used.


Answer:


Question: 314


DRAG DROP


Drag and drop the expressions from below onto the code to implement error handling. Not all options are used.



Answer:



Question: 315


Refer to the exhibit.



The YAML represented is using the ios_vrf module.


As part of the Ansible playbook workflow, what is the result when this task is run?

  1. VRFs not defined in the host_vars file are removed from the device.

  2. VRFs not defined in the host_vars file are added to the device, and any other VRFs on the device remain.

  3. VRFs defined in the host_vars file are removed from the device.

  4. VRFs are added to the device from the host_vars file, and any other VRFs on the device are removed.

Answer: D


Question: 316


User report that they can no longer process transactions with the online ordering application, and the logging dashboard is displaying these messages.


Fri Jan 10 19:37:31.123 EST 2020 [FRONTEND] INFO: Incoming request to add item to cart from user 45834534858 Fri Jan 10 19:37:31 247 EST 2020 [BACKEND] INFO: Attempting to add item to cart

Fri Jan 10 19:37:31 250 EST 2020 [BACKEND] ERROR: Failed to add item: MYSQLDB ERROR: Connection refused


What is causing the problem seen in these log messages?

  1. The database server container has crashed.

  2. The backend process is overwhelmed with too many transactions.

  3. The backend is not authorized to commit to the database.

  4. The user is not authorized to add the item to their cart.


Answer: A Question: 317 Refer to the exhibit.


What is the output of this IOS-XE configuration program?

  1. interface operational status in IPv6 addresses

  2. interface administrative status in IPv4 addresses

  3. interface operational status in IPv4 addresses

  4. interface administrative status in IPv6 addresses


Answer: D