DON'T WANT TO MISS A THING?

Certification Exam Passing Tips

Latest exam news and discount info

Curated and up-to-date by our experts

Yes, send me the newsletter

Master CCNP 350-901 Exams with Exam Questions & Study Materials, Cisco DEVNet 350-901 DEVCOR | SPOTO

Prepare to master your Cisco 350-901 DEVCOR exam and achieve Cisco DevNet Professional certification with SPOTO's comprehensive exam questions and study materials. Our practice tests cover key topics such as implementing network applications on Cisco® platforms, software design, system integration, testing, and deployment automation. Gain hands-on experience in solving real-world problems using Cisco Application Programming Interfaces (APIs) and modern development tools through our exam practice and simulator. Access free test samples, exam dumps, and online exam questions to enhance your preparation. Our exam materials include exam questions and answers, mock exams, and exam preparation resources to ensure you're fully prepared for success. With SPOTO's study materials, master your CCNP 350-901 DEVCOR exam confidently and excel in your professional career.
Take other online exams

Question #1
An organization manages a large cloud-deployed application that employs a microservices architecture. No notable issues occur with downtime because the services of this application are redundantly deployed over three or more data center regions. However, several times a week reports are received about application slowness. The container orchestration logs show faults in a variety of containers that cause them to fail and then spin up brand new. Which action must be taken to improve the resiliency design of
A. Update the base image of the containers
B. Test the execution of the application with another cloud services platform
C. Increase the number of containers running per service
D. Add consistent “try/catch(exception)” clauses to the code
View answer
Correct Answer: AD
Question #2
Which two situations are flagged by software tools designed for dependency checking in continuous integration environments, such as OWASP? (Choose two.)
A. publicly disclosed vulnerabilities related to the included dependencies
B. mismatches in coding styles and conventions in the included dependencies
C. incompatible licenses in the included dependencies
D. test case failures introduced by bugs in the included dependencies
E. buffer overflows to occur as the result of a combination of the included dependencies
View answer
Correct Answer: BC
Question #3
An Intersight API is being used to query RackUnit resources that have a tag keyword set to “Site”. What is the expected output of this command?
A. list of all resources that have a tag with the keyword “Site”
B. error message because the Value field was not specified
C. error message because the tag filter should be lowercase
D. list of all sites that contain RackUnit tagged compute resources
View answer
Correct Answer: A
Question #4
User report that they can no longer process transactions with the online ordering application, and the logging dashboard is displaying these messages. Fri Jan 10 19:37:31.123 EST 2020 [FRONTEND] INFO: Incoming request to add item to cart from user 45834534858 Fri Jan 10 19:37:31 247 EST 2020 [BACKEND] INFO: Attempting to add item to cart Fri Jan 10 19:37:31 250 EST 2020 [BACKEND] ERROR: Failed to add item: MYSQLDB ERROR: Connection refused What is causing the problem seen in these log messages?
A. The database server container has crashed
B. The backend process is overwhelmed with too many transactions
C. The backend is not authorized to commit to the database
D. The user is not authorized to add the item to their cart
View answer
Correct Answer: DE
Question #5
Many faults have occurred in the ACI environment and a sample of them needs to be examined. Which API call retrieves faults 30 through 45?
A. GET https://apic-ip-address/api/class/faultInfo
B. GET https://apic-ip-address/api/class/faultInfo
C. GET https://apic-ip-address/api/class/faultInfo
D. GET https://apic-ip-address/api/class/faultInfo
View answer
Correct Answer: B
Question #6
An application uses an API to periodically sync a large data set. Based on the HTTP message sequence provided, which statements are true about the caching behavior seen in the scenario? (Choose two.)
A. The full dataset was transmitted to the client twice
B. The dataset changed sometime between message #4 and #5
C. A partial dataset was transmitted to the client in message #4
D. The dataset did not change during the scenario
E. Messages #3 and #5 are equivalent
View answer
Correct Answer: D
Question #7
Which RFC5988 (Web Linking) relation type is used in the Link header to control pagination in APIs?
A. rel=”index”
B. rel=”page”
C. rel=”next”
D. rel=”section”
View answer
Correct Answer: B
Question #8
A developer has completed the implementation of a REST API, but when it is executed, it returns a 401 error message. What must be done on the API to resolve the issue?
A. Access permission to the resource must be granted, before the request
B. Configure new valid credentials
C. The requested API endpoint does not exist, and the request URL must be changed
D. Additional permission must be granted before the request can submitted
View answer
Correct Answer: AB
Question #9
A network operations team is using the cloud to automate some of their managed customer and branch locations. They require that all of their tooling be ephemeral by design and that the entire automation environment can be recreated without manual commands. Automation code and configuration state will be stored in git for change control and versioning. The engineering high-level plan is to use VMs in a cloud-provider environment then configure open source tooling onto these VMs to poll, test, and configure t
A. Ansible
B. Ansible and Terraform
C. NSO
D. Terraform
E. Ansible and NSO
View answer
Correct Answer: AE
Question #10
The UCS Python SDK includes modules for Service Profile template creation. Which two UCS Service Profile template types are supported? (Choose two.)
A. initial-template
B. updating-templateC
D. attached-template
E. base-template
View answer
Correct Answer: S
Question #11
A developer has created an application based on customer requirements. The customer needs to run the application with the minimum downtime. Which design approach regarding high-availability applications, Recovery Time Objective, and Recovery Point Objective must be taken?
A. Active/passive results in lower RTO and RPO
B. Active/passive results in lower RTO and RPO
C. Active/active results in lower RTO and RPO
D. Active/active results in lower RTO and RPO
View answer
Correct Answer: A
Question #12
How should a web application be designed to work on a platform where up to 1000 requests per second can be served?
A. Use algorithms like random early detection to deny excessive requests
B. Set a per-user limit (for example, 5 requests/minute/user) and deny the requests from the users who have reached the limit
C. Only 1000 user connections are allowed; further connections are denied so that all connected users can be served
D. All requests are saved and processed one by one so that all users can be served eventually
View answer
Correct Answer: D
Question #13
Which two statements are considered best practices according to the 12-factor app methodology for application design? (Choose two.)
A. Application code writes its event stream to stdout
B. Application log streams are archived in multiple replicated databases
C. Application log streams are sent to log indexing and analysis systems
D. Application code writes its event stream to specific log files
E. Log files are aggregated into a single file on individual nodes
View answer
Correct Answer: A
Question #14
An application uses OAuth to get access to several API resources on behalf of an end user. What are two valid parameters to send to the authorization server as part of the first step of an authorization code grant flow? (Choose two.)
A. URI to which the authorization server will send the user-agent back when access is granted or denied
B. list of the API resources that the application is requesting to access
C. secret that was generated by the authorization server when the application registered as an OAuth integration
D. list of scopes that correspond to the API resources to which the application is requesting to accessE
View answer
Correct Answer: A
Question #15
An Etag header is included in the HTTP response for an API resource. What are two benefits of using the value of the Etag for future interactions involving the same API resource? (Choose two.)
A. caching and optimization of response payloads
B. creating conditional requests
C. categorizing and comparing this API resource with others
D. checking the integrity of the resource
E. requesting the list of operations authorized for this resource
View answer
Correct Answer: S
Question #16
An organization manages a large cloud-deployed application that employs a microservices architecture across multiple data centers. Reports have received about application slowness. The container orchestration logs show that faults have been raised in a variety of containers that caused them to fail and then spin up brand new instances. Which two actions can improve the design of the application to identify the faults? (Choose two.)
A. Automatically pull out the container that fails the most over a time period
B. Implement a tagging methodology that follows the application execution from service to service
C. Add logging on exception and provide immediate notification
D. Do a write to the datastore every time there is an application failure
E. Implement an SNMP logging system with alerts in case a network link is slow
View answer
Correct Answer: D
Question #17
Which line of code must be added to this code snippet to allow an application to pull the next set of paginated items?
A. requests
B. requests
C. requests
D. requests
View answer
Correct Answer: AC
Question #18
Which two functions are performed by the load balancer when it handles traffic originating from the Internet destined to an application hosted on the file server farm? (Choose two.)
A. Terminate the TLS over the UDP connection from the router and originate an HTTPS connection to the selected server
B. Terminate the TLS over the UDP connection from the router and originate an HTTP connection to the selected server
C. Terminate the TLS over the TCP connection from the router and originate an HTTP connection to the selected server
D. Terminate the TLS over the TCP connection from the router and originate an HTTPS connection to the selected server
E. Terminate the TLS over the SCTP connection from the router and originate an HTTPS connection to the selected server
View answer
Correct Answer: S
Question #19
Two editors are concurrently updating an article’s headline from their mobile devices. What results from this scenario based on this REST API sequence?
A. The article is marked as “Conflicted”
B. The article headline is “Monday Headlines”
C. The article headline is “Today Headlines”
D. The article headline is “Top Headlines”
View answer
Correct Answer: S
Question #20
The cURL POST request creates an OAuth access token for authentication with FDM API requests. What is the purpose of the file “@token_data” that cURL is handling?
A. This file is a container to log possible error responses in the request
B. This file is given as input to store the access token received from FDM
C. This file is used to send authentication related headers
D. This file contains raw data that is needed for token authentication
View answer
Correct Answer: S

View Answers after Submission

Please submit your email and WhatsApp to get the answers of questions.

Note: Please make sure your email ID and Whatsapp are valid so that you can get the correct exam results.

Email:
Whatsapp/phone number: