DON'T WANT TO MISS A THING?

Certification Exam Passing Tips

Latest exam news and discount info

Curated and up-to-date by our experts

Yes, send me the newsletter

Prepare for CCNP 350-901 Exams Questions & Study Materials, Cisco DEVNet 350-901 DEVCOR | SPOTO

Prepare effectively for your CCNP 350-901 exams with SPOTO's comprehensive study materials and exam questions. Our materials cover key topics such as implementing network applications on Cisco® platforms, software design, system integration, testing, and deployment automation. Gain hands-on experience in solving real-world problems using Cisco Application Programming Interfaces (APIs) and modern development tools through our exam practice and simulator. Access free test samples, exam dumps, and online exam questions to enhance your preparation. Our exam materials include exam questions and answers, mock exams, and preparation resources to ensure you're fully prepared for success. With SPOTO's study materials and exam practice, boost your readiness and excel in your CCNP 350-901 DEVCOR certification journey.
Take other online exams

Question #1
As part of the Ansible playbook workflow, several new interfaces are being configured using the netconf_config module. The task references the interface variables that are unique per device. In which directory is the YAML file with these variables found?
A. host_vars directory
B. home directory
C. group_vars directory
D. current working directory
View answer
Correct Answer: A
Question #2
The Ansible playbook is using the netconf_module to configure an interface using a YANG model. As part of this workflow, which YANG models augment the interface?
A. ietf-interfaces and ietf-ip
B. iana-if-type and ietf-interfaces
C. ietf-ip and openconfig-interface
D. ietf-ip and iana-if-type
View answer
Correct Answer: A
Question #3
A developer needs to configure an environment to orchestrate and configure. Which two tools should be used for each task? (Choose two.)
A. Puppet for orchestration
B. Terraform for orchestration
C. Terraform for configuration
D. Ansible for orchestration
E. Ansible for configuration
View answer
Correct Answer: D
Question #4
This script uses ciscoyang to configure two VRF instances on a Cisco IOS-XR device using the Yang NETCONF type. Which two words are required to complete the script? (Choose two.)
A. ensure
B. commitC
D. replace
E. none
View answer
Correct Answer: B
Question #5
The response from a server includes the header ETag: W/”7eb8b94419e371767916ef13e0d6e63d”. Which statement is true?
A. The ETag has a Strong validator directive
B. The ETag has a Weak validator directive, which is an optional directive
C. The ETag has a Weak validator directive, which is a mandatory directive
D. The ETag has a Strong validator directive, which it is incorrectly formatted
View answer
Correct Answer: D
Question #6
Which additional line results in the output of Test 1 upon execution of the docker run --rm devnet 1 command in a Dockerfile with this content?
A. CMD [“/bin/echo”, “Test”]
B. RUN [“/bin/echo”, “Test”]
C. ENTRYPOINT [“/bin/echo”, “Test”]
D. CMD [“/bin/echo Test”]
View answer
Correct Answer: AB
Question #7
Which key value pair from the ios_ntp Ansible module creates an NTP server peer?
A. state: present
B. state: True
C. config: present
D. config: True
View answer
Correct Answer: DE
Question #8
A developer has just completed the configuration of an API that connects sensitive internal systems. Based on company policies, the security of the data is a high priority. Which approach must be taken to secure API keys and passwords?
A. Embed them directly in the code
B. Store them in a hidden file
C. Store them inside the source tree of the application
D. Change them periodically
View answer
Correct Answer: S
Question #9
A container running a Python script is failing when it reaches the integration testing phase of the CI/CD process. The code has been reviewed thoroughly and the build process works on this container and all other containers pass unit and integration testing. What should be verified to resolve the issue?
A. that the correct port is exposed in the Dockerfile
B. that the necessary modules and packages are installed on build
C. that the script is running from the night directory
D. that the Python version of the container image is correct
View answer
Correct Answer: S
Question #10
A kubeconfig file to manage access to clusters is provided. How many clusters are defined and which of them are accessed using username/password authentication versus certificate?
A. two clusters; scratch
B. three clusters; scratch
C. three clusters; development
D. two clusters; development
View answer
Correct Answer: B
Question #11
A heterogeneous network of vendors and device types needs automating for better efficiency and to enable future automated testing. The network consists of switches, routers, firewalls and load balancers from different vendors, however they all support the NETCONF/RESTCONF configuration standards and the YAML models with every feature the business requires. The business is looking for a buy versus build solution because they cannot dedicate engineering resources, and they need configuration diff and rollback
A. Ansible
B. Ansible and Terraform
C. NSO
D. Terraform
E. Ansible and NSO
View answer
Correct Answer: C
Question #12
Which code snippet is required in the headers to successfully authorize wireless information from Cisco DNA Center?
A. headers = {‘X-auth-token’:’fa8426a0-8eaf-4d22-8e13-7c1b16a9370c’}
B. headers = {‘Authorization’:’Basic YWRtaW46R3JhcGV2aW5IMQ==’}
C. headers = {‘Authorization’:’Bearer ASDNFALKJER23412RKDALSNKF”}
D. headers = {‘Content-type’:’application/json}
View answer
Correct Answer: B
Question #13
The YAML represented is using the ios_vrf module. As part of the Ansible playbook workflow, what is the result when this task is run?
A. VRFs not defined in the host_vars file are removed from the device
B. VRFs not defined in the host_vars file are added to the device, and any other VRFs on the device remain
C. VRFs defined in the host_vars file are removed from the device
D. VRFs are added to the device from the host_vars file, and any other VRFs on the device are removed
View answer
Correct Answer: CD
Question #14
AppGigabitEthernet interface is used as data port for a container on a Cisco Catalyst 9000 Series Switch. Which two interface configuration options should be used? (Choose two.)
A. trunk interface
B. bridged virtual interface
C. SPAN port
D. management interface
E. subinterface
View answer
Correct Answer: S
Question #15
There is a requirement to securely store unique usernames and passwords. Given a valid username, it is also required to validate that the password provided is correct. Which action accomplishes this task?
A. Encrypt the username, hash the password, and store these values
B. Hash the username, hash the password, and store these values
C. Encrypt the username, encrypt the password, and store these values
D. Hash the username, encrypt the password, and store these values
View answer
Correct Answer: S
Question #16
A company has extended networking from the data center to the cloud through Transit VPC. Which two statements describe the benefits of this approach? (Choose two.)
A. Dynamic routing combined with multi-AZ- deployment creates a robust network infrastructure
B. VPC virtual gateways provide highly available connections to virtual networks
C. Dedicated VPC simplifies load balancing by combining internal and external web services
D. VPC virtual gateways provide more secure connections to virtual networks
E. Dedicated VPC simplifies routing by not combining this service with other shared services
View answer
Correct Answer: S
Question #17
Click on the GET Resource button above to view resources that will help with this question. An engineer is managing a DC with 6000 Cisco UCS servers installed and running. The engineer has been asked to identify all resources where the model is in the UCSB family and the available memory is less than or equal to 5 GB. Which REST API call accomplishes this task?
A. GET/api/v1/compute/RackUnits?$select=Vendor,Model,Serial&$filter=not(Model eq ‘UCSC’) and AvailableMemory le 5000
B. GET/api/v1/compute/RackUnits?$select=Vendor,Model,Serial&$filter=Model eq ‘UCSB’ and AvailableMemory lt 5000
C. GET/api/v1/compute/RackUnits?$select=Vendor,Model,Serial&$filter=contains(Model, UCSB’) and AvailableMemory lt 5000
D. GET/api/v1/compute/RackUnits?$select=Vendor,Model,Serial&$filter=contains(Model, UCSB’) and AvailableMemory le 5000
View answer
Correct Answer: S
Question #18
Which configuration of method and parameter retrieves the health of a laptop connected to the network from Cisco DNA Center?
A. PUT; network-health;
B. GET; client-health;
C. GET; network-device;
D. POST; network-device;
View answer
Correct Answer: S
Question #19
On a Cisco Catalyst 9300 Series Switch, the guest shell is being used to create a service within a container. Which change is needed to allow the service to have external access?
A. Apply ip nat overload on VirtualPortGroup0
B. Apply ip nat inside on Interface VirtualPortGroup0
C. Apply ip nat outside on Interface VirtualPortGroup0
D. Apply ip nat inside on Interface GigabitEthernet1
View answer
Correct Answer: S
Question #20
An automated solution is needed to configure VMs in numerous cloud provider environments to connect the environments to an SDWAN. The SDWAN edge VM is provided as an image in each of the relevant clouds and can be given an identity and all required configuration via cloud-init without needing to log into the VM once online. Which configuration management and/or automation tooling is needed for this solution?
A. Ansible
B. Ansible and Terraform
C. NSO
D. Terraform
E. Ansible and NSO
View answer
Correct Answer: B

View Answers after Submission

Please submit your email and WhatsApp to get the answers of questions.

Note: Please make sure your email ID and Whatsapp are valid so that you can get the correct exam results.

Email:
Whatsapp/phone number: