350-901 Dumps
350-901 Braindumps
350-901 Real Questions
350-901 Practice Test
350-901 Actual Questions
killexams.com
Developing Applications using Cisco Core Platforms and APIs (DEVCOR)
https://killexams.com/pass4sure/exam-detail/350-901
Question: 303
Which statement about microservices architecture is true?
Applications are written in a single unit.
It is a complex application composed of multiple independent parts.
It is often a challenge to scale individual parts.
A single faulty service can bring the whole application down.
Question: 304
Application sometimes store configuration as constants in the code, which is a violation of strict separation of configuration from code.
Where should application configuration be stored?
environment variables
YAML files
Python libraries
Dockerfiles
INI files
Question: 305
Which two methods are API security best practices? (Choose two.)
Use tokens after the identity of a client has been established.
Use the same operating system throughout the infrastructure.
Use encryption and signatures to secure data.
Use basic auth credentials over all internal API interactions.
Use cloud hosting services to manage security configuration.
Answer: AC Question: 306 DRAG DROP
Drag and drop the steps from the left into the correct sequence on the right to describe how to use Git to maintain the current HEAD and revert back to a previous commit, while undoing all intermediate commits.
Question: 307
Refer to the exhibit.
The cURL POST request creates an OAuth access token for authentication with FDM API requests. What is the purpose of the file “@token_data” that cURL is handling?
This file is a container to log possible error responses in the request.
This file is given as input to store the access token received from FD
This file is used to send authentication related headers.
This file contains raw data that is needed for token authentication.
Question: 308
A user is receiving a 429 Too Many Requests error.
Which scheme is the server employing that causes this error?
rate limiting
time outs
caching
redirection
Question: 309
Which two situations are flagged by software tools designed for dependency checking in continuous integration environments, such as OWASP? (Choose two.)
publicly disclosed vulnerabilities related to the included dependencies
mismatches in coding styles and conventions in the included dependencies
incompatible licenses in the included dependencies
test case failures introduced by bugs in the included dependencies
buffer overflows to occur as the result of a combination of the included dependencies
Question: 310
Which two data encoding techniques are supported by gRPC? (Choose two.)
XML
JSON
ASCII
ProtoBuf
YAML
Question: 311
An organization manages a large cloud-deployed application that employs a microservices architecture across multiple data centers. Reports have received about application slowness. The container orchestration logs show that faults have been raised in a variety of containers that caused them to fail and then spin up brand new instances.
Which two actions can improve the design of the application to identify the faults? (Choose two.)
Automatically pull out the container that fails the most over a time period.
Implement a tagging methodology that follows the application execution from service to service.
Add logging on exception and provide immediate notification.
Do a write to the datastore every time there is an application failure.
Implement an SNMP logging system with alerts in case a network link is slow.
Answer: BC Question: 312 DRAG DROP
Drag and drop the git commands from the left into the correct order on the right to create a feature branch from the master and then incorporate that feature branch into the master.
Question: 313
DRAG DROP
Refer to the exhibit.
Drag and drop parts of the URL from the left onto the item numbers on the right that match the missing sections in the exhibit to create the appropriate RESTCONF URL to query the VLAN configuration given this YANG model. Not all URL parts are used.
Question: 314
DRAG DROP
Drag and drop the expressions from below onto the code to implement error handling. Not all options are used.
Question: 315
Refer to the exhibit.
The YAML represented is using the ios_vrf module.
As part of the Ansible playbook workflow, what is the result when this task is run?
VRFs not defined in the host_vars file are removed from the device.
VRFs not defined in the host_vars file are added to the device, and any other VRFs on the device remain.
VRFs defined in the host_vars file are removed from the device.
VRFs are added to the device from the host_vars file, and any other VRFs on the device are removed.
Question: 316
User report that they can no longer process transactions with the online ordering application, and the logging dashboard is displaying these messages.
Fri Jan 10 19:37:31.123 EST 2020 [FRONTEND] INFO: Incoming request to add item to cart from user 45834534858 Fri Jan 10 19:37:31 247 EST 2020 [BACKEND] INFO: Attempting to add item to cart
Fri Jan 10 19:37:31 250 EST 2020 [BACKEND] ERROR: Failed to add item: MYSQLDB ERROR: Connection refused
What is causing the problem seen in these log messages?
The database server container has crashed.
The backend process is overwhelmed with too many transactions.
The backend is not authorized to commit to the database.
The user is not authorized to add the item to their cart.
Answer: A Question: 317 Refer to the exhibit.
What is the output of this IOS-XE configuration program?
interface operational status in IPv6 addresses
interface administrative status in IPv4 addresses
interface operational status in IPv4 addresses
interface administrative status in IPv6 addresses