350-901: Developing Applications using Cisco Core Platforms and APIs (DEVCOR) Part 2
Question #: 61
Topic #: 1
DRAG DROP –
Drag and drop the descriptions from the left onto the related OAuth-defined roles on the right.
Select and Place:
Suggestion Answer:
Question #: 62
Topic #: 1
Refer to the exhibit. This cURL POST request creates an OAuth access token for authentication with FDM API requests.
What is the purpose of the file `@token_data` that cURL is handling?
A. This file is given as input to store the access token received from FDM.
B. This file is used to send authentication-related headers.
C. This file contains raw data that is needed for token authentication.
D. This file is a container to log possible error responses in the request.
Selected Answer: C
Question #: 63
Topic #: 1
What is the result of a successful OAuth2 authorization grant flow?
A. The third-party service is provided with a token that allows actions to be performed.
B. The user has the application rights that correspond to the user’s role within the application’s database.
C. The application is provided with a token that allows actions on services on the user’s behalf.
D. The user has administrative rights to the application’s backend services.
Selected Answer: C
Question #: 64
Topic #: 1
In the three-legged OAuth2 process, after the authorization server presents a form to the resource owner to grant access, what is the next step?
A. The resource owner authenticates and optionally authorizes with the authorization server.
B. The user who owns the resource initiates a request to the OAuth client.
C. If the resource owner allows access, the authorization server sends the OAuth client a redirection.
D. A form to allow or restrict access is submitted by the owner of the resource.
Selected Answer: D
Question #: 65
Topic #: 1
Which OAuth mechanism enables clients to continue to have an active access token without further interaction from the user?
A. refresh grant
B. JWT
C. password grant
D. preshared key
Selected Answer: A
Question #: 66
Topic #: 1
A developer is building an application to access a website. When running the application, an HTTP 403 error code has been received.
How should the application be modified to handle this code?
A. Create a loop on cancel the operation and run a new one after the code is received.
B. Use exponential backoff when retrying distributed services and other remote endpoints.
C. Build a try/except around the urlopen to find errors occurring in the request.
D. Redirect the request to an internal web server and make a new request from the internal resource.
Selected Answer: C
Question #: 67
Topic #: 1
Refer to the exhibit. Which API call does an engineer use to delete the FQDN object?
A. DELETE /api/fmc_config/v1/domain/e276abec-e0f2-11e3-8169-6d9ed49b625f
B. DELETE /api/fmc_config/v1/domain/e276abec-e0f2-11e3-8169-6d9ed49b625f/object/fqdns/005056BB-0B24-0ed3-0000-858993545263
C. DELETE /api/fmc_config/v1/domain?id=e276abec-e0f2-11e3-8169-6d9ed49b625f
D. DELETE /api/fmc_config/v1/domain/e276abec-e0f2-11e3-8169-6d9ed49b625f/object/fqdns?id=005056BB-0B24-0ed3-0000-858993545263
Selected Answer: B
Question #: 68
Topic #: 1
Refer to the exhibit. Which code snippet completes this code to handle API rate-limit?
A. response.status_code == 429
B. response.status_code != 408
C. response.status != 408
D. response.status_code != 429
Selected Answer: A
Question #: 69
Topic #: 1
Refer to the exhibit. Which parameter is missing from the JSON response to confirm the API version that is used?
A. version 4
B. v 10
C. 2
D. version 2
Selected Answer: C
Question #: 70
Topic #: 1
Which two methods are API security best practices? (Choose two.)
A. Use tokens after the identity of a client has been established.
B. Use the same operating system throughout the infrastructure.
C. Use encryption and signatures to secure data.
D. Use basic auth credentials over all internal API interactions.
E. Use cloud hosting services to manage security configuration.
Selected Answer: AC
Question #: 71
Topic #: 1
DRAG DROP –
Refer to the exhibit. The Python script is supposed to make an API call to Cisco DNA Center querying a wireless profile for the `ChicagoCampus` and then parsing out its enable FlexConnect value. Drag and drop the parts of the Python code from the left onto the item numbers on the right that match the missing sections in the exhibit.
Select and Place:
Suggestion Answer:
Question #: 72
Topic #: 1
DRAG DROP –
A developer is creating a Python script to catch errors using REST API calls and to aid in debugging. Drag and drop the code from the bottom onto the box where the code is missing to implement control flow for REST API errors. Not all options are used.
Select and Place:
Suggestion Answer:
Question #: 73
Topic #: 1
Which two encryption principles should be applied to secure APIs? (Choose two.)
A. Use temporary files as part of the encryption and decryption process.
B. Use encrypted connections to protect data in transit.
C. Reuse source code that contain existing UUIDs.
D. Embed keys in code to simplify the decryption process.
E. Transmit authorization information by using digitally signed payloads.
Selected Answer: BE
Question #: 74
Topic #: 1
DRAG DROP –
Drag and drop the code from the bottom onto the box where the code is missing to provision a new Cisco Unified Computing System server by using the UCS
XML API. Options may be used more than once. Not all options are used.
Select and Place:
Suggestion Answer:
Question #: 75
Topic #: 1
Refer to the exhibit. An application has been developed to serve the users in an enterprise. After HTTP cache controls are implemented in the application, users report that they receive stale data when they refresh the page. Without removing HTTP cache controls, which change ensures that the users get current data when refreshing the page?
A. Add an if-None-Match header that has a value of an Entity Tag.
B. Reduce the expire_after value to 60.
C. Add an Expires header that has a value of 0.
D. Add a Cache-Control header that has a value of no-cache, no-store, must-revalidate.
Selected Answer: A
Question #: 76
Topic #: 1
DRAG DROP –
Refer to the exhibit. Drag and drop the correct parts of the Dockerfile from the left onto the item numbers on the right that match the missing sections in the exhibit to complete the Dockerfile to successfully build and deploy a container running a Python application. Not all parts of the Dockerfile are used.
Select and Place:
Suggestion Answer:
Question #: 77
Topic #: 1
The UCS Python SDK includes modules for Service Profile template creation.
Which two UCS Service Profile template types are supported? (Choose two.)
A. initial-template
B. updating-template
C. abstract-template
D. attached-template
E. base-template
Selected Answer: AB
Question #: 78
Topic #: 1
A container running a Python script is failing when it reaches the integration testing phase of the CI/CD process. The code has been reviewed thoroughly, and the build process works on this container and all other containers pass unit and integration testing.
What should be verified to resolve the issue?
A. that the correct port is exposed in the Dockerfile
B. that the necessary modules and packages are installed on build
C. that the script is running from the right directory
D. that the Python version of the container image is correct
Selected Answer: C
Question #: 79
Topic #: 1
Click on the GET Resource button above to view resources that will help with this question.
An engineer is managing a data center with 6000 Cisco UCS servers installed and running. The engineer has been asked to identify all resources where the model is in the UCSB family and the available memory is less than or equal to 5 GB.
Which REST API call accomplishes this task?
A. GET/api/v1/compute/RackUnits?$select=Vendor,Model,Serial&$filter=not(Model eq ‘UCSC’) and AvailableMemory le 5000
B. GET/api/v1/compute/RackUnits?$select=Vendor,Model,Serial&$filter=Model eq ‘UCSB’ and AvailableMemory lt 5000
C. GET/api/v1/compute/RackUnits?$select=Vendor,Model,Serial&$filter=contains(Model, UCSB’) and AvailableMemory lt 5000
D. GET/api/v1/compute/RackUnits?$select=Vendor,Model,Serial&$filter=contains(Model, UCSB’) and AvailableMemory le 5000
Selected Answer: D
Question #: 80
Topic #: 1
AppGigabitEthernet interface is used as data port for a container on a Cisco Catalyst 9000 Series Switch.
Which two interface configuration options should be used? (Choose two.)
A. trunk interface
B. bridged virtual interface
C. SPAN port
D. management interface
E. subinterface
Selected Answer: AC
Question #: 81
Topic #: 1
Which two types of storage are supported for app hosting on a Cisco Catalyst 9000 Series Switch? (Choose two.)
A. external USB storage
B. internal SSD
C. CD-ROM
D. SD-card
E. bootflash
Selected Answer: AB
Question #: 82
Topic #: 1
Refer to the exhibit. Which configuration of method and parameter retrieves the health of a laptop connected to the network from Cisco DNA Center?
A. PUT; network-health;
B. GET; client-health;
C. GET; network-device;
D. POST; network-device;
Selected Answer: B
Question #: 83
Topic #: 1
On a Cisco Catalyst 9300 Series Switch, the guest shell is being used to create a service within a container.
Which change is needed to allow the service to have external access?
A. Apply ip nat overload on VirtualPortGroup0.
B. Apply ip nat inside on Interface VirtualPortGroup0.
C. Apply ip nat outside on Interface VirtualPortGroup0.
D. Apply ip nat inside on Interface GigabitEthernet1.
Selected Answer: B
Question #: 84
Topic #: 1
Refer to the exhibit. Which code snippet is required in the headers to successfully authorize wireless information from Cisco DNA Center?
A. headers = {‘X-auth-token’:’fa8426a0-8eaf-4d22-8e13-7c1b16a9370c’}
B. headers = {‘Authorization’:’Basic YWRtaW46R3JhcGV2aW5IMQ==’}
C. headers = {‘Authorization’:’Bearer ASDNFALKJER23412RKDALSNKF’}
D. headers = {‘Content-type’:’application/json’}
Selected Answer: A
Question #: 85
Topic #: 1
Into which two areas are AppDynamics APIs categorized? (Choose two.)
A. application-centric
B. analytics-events
C. database-visibility
D. platform-side
E. agent-side
Selected Answer: DE
Question #: 86
Topic #: 1
Refer to the exhibit. This script uses ciscoyang to configure two VRF instances on a Cisco IOS-XR device using the Yang NETCONF type.
Which two words are required to complete the script? (Choose two.)
A. ensure
B. commit
C. false
D. replace
E. none
Selected Answer: CD
Question #: 87
Topic #: 1
DRAG DROP –
Refer to the exhibit. Python threading allows a developer to have different parts of a program run concurrently and simplify a design. Drag and drop the code snippets from the left onto the item numbers on the right that match the missing sections in the exhibit to create a thread instance.
Select and Place:
Suggestion Answer:
Question #: 88
Topic #: 1
DRAG DROP –
A developer is creating a Python script to use the Webex REST API to list joined spaces, and gracefully handle and print the errors it receives. Drag and drop the code snippets from the left onto the item numbers on the right that match the missing sections in the exhibit to complete the script.
Select and Place:
Suggestion Answer:
Question #: 89
Topic #: 1
DRAG DROP –
Refer to the exhibit above and click on the resource tabs in the top left corner to view resources to help with this question.
A developer is creating a Python Script that will use the Webex REST API to automatically create a new collaboration space with him and his team leads on- demand via a Linux terminal command. Drag and drop the code snippets from the left onto the numbers on the right that match the missing sections in the exhibit to complete the script. Not all code snippets are used.
Select and Place:
Suggestion Answer:
Question #: 90
Topic #: 1
Refer to the exhibits above and click on the IETF Routing tab in the top left corner to help with this question. A developer is trying to update the routing instance by adding a new route to the routes list using the URL in the exhibit.
What action must be taken to fix the error being received?
A. Fix the body being sent to update the routes list
B. Change the HTTP Method being used to make the change
C. Change the url to ג€/ietf-routing:routing/routing-instance=defaultג€
D. Update the authorization credentials
E. Change the URL to ג€/ietf-routing:routing-instance/defaultג€
Selected Answer: C
Question #: 91
Topic #: 1
Which two design considerations should be considered when building a Cisco Meraki dashboard out of available APIs? (Choose two.)
A. If the API key is shared, it cannot be regenerated.
B. The API requests require the key and the user credentials.
C. API call volume is rate-limited to five calls per second per organization.
D. The API version does not need to be specified in the URL.
E. Access to the API must first be enabled by using the settings for an organization.
Selected Answer: CE
Question #: 92
Topic #: 1
An engineer must enable an SSID in a Meraki network.
Which request accomplishes this task?
A. PUT /networks/{networkId}/ssids/{number}?enabled=true
B. POST /networks/{networkId}/ssids/{number}?enabled=true
C. PUT /networks/{networkId}/ssids/{number} {“enable”: true}
D. POST /networks/{networkId}/ssids/{number} {“enable”: true}
Selected Answer: C
Question #: 93
Topic #: 1
Refer to the exhibit. The JSON response is received from the Meraki location API.
Which parameter is missing?
A. apMac
B. clientMac
C. clientId
D. accesspoint
Selected Answer: D
Question #: 94
Topic #: 1
{‘lat’: 37.4180951010362, ‘lng’: -122.098531723022, ‘address’: ”, ‘serial’: ‘Q2HP-F5K5-F98Q’,
‘mac’: ’88:15:44:ea:f5:bf’, ‘lanIp’: ‘10.10.10.15’,
‘url’: ‘https://n149.meraki.com/DevNet-Sandbox/n/EFZDavc/manage/nodes/new_list/78214561218351’,
‘model’: ‘MS220-8P’, ‘switchProfileId’: None, ‘firmware’: ‘switch-11-31’, ‘floorPlanId’: None}
Refer to the exhibit. A developer needs to find the geographical coordinates of a device on the network L_397561557481105433 using a Python script to query the Meraki API. After running response = requests.get() against the Meraki API, the value of response.text is shown in the exhibit.
What Python code is needed to retrieve the longitude and latitude coordinates of the device?
A. latitude = response.text[‘lat’] longitude = response.text[‘lng’] B. latitude = response.json()[‘lat’] longitude = response.json()[‘lng’] C. latitude = response.json()[0] longitude = response.json()[1] D. latitude = response.text[0] longitude = response.text[1]
Selected Answer: B
Question #: 95
Topic #: 1
A timeframe custom dashboard must be developed to present data collected from Cisco Meraki. The dashboard must include a wireless health alert count.
What needs to be built as a prerequisite?
A. A publicly available HTTP server to receive Meraki Webhooks from the Meraki Scanning API.
B. A publicly available HTTP server to receive Meraki Webhooks from the Meraki Dashboard API.
C. A daemon to consume the Wireless Health endpoint of the Meraki Dashboard API.
D. A daemon to consume the Wireless Health endpoint of the Meraki Scanning API.
Selected Answer: B
Question #: 96
Topic #: 1
A custom dashboard of the network health must be created by using Cisco DNA Center APIs. An existing dashboard is a RESTful API that receives data from
Cisco DNA Center as a new metric every time the network health information is sent from the script to the dashboard.
Which set of requests creates the custom dashboard?
A. POST request to Cisco DNA Center to obtain the network health information, and then a GET request to the dashboard to publish the new metric
B. GET request to Cisco DNA Center to obtain the network health information, and then a PUT request to the dashboard to publish the new metric
C. GET request to Cisco DNA Center to obtain the network health information, and then a POST request to the dashboard to publish the new metric
D. PUT request to Cisco DNA Center to obtain the network health information, and then a POST request to the dashboard to publish the new metric
Selected Answer: C
Question #: 97
Topic #: 1
DRAG DROP –
Refer to the exhibit. A developer is creating a Python script by using Cisco DNA Center APIs. Drag and drop the code from the bottom onto the box where the code is missing in the Python script to retrieve and display wireless health information for each site. Not all options are used.
Select and Place:
Suggestion Answer:
Question #: 98
Topic #: 1
DRAG DROP –
Request Model –
Refer to the exhibit above and click on the resource tabs in the top left corner to view resources to help with this question. The script uses the Cisco Intersight
REST API. Drag and drop the code from the left onto the item numbers on the right to match the missing sections in the Python script to update the firmware on a specific Cisco Intersight managed UCS rack server, DMZ-R-L3-ADJM. Not all code snippets are used.
Select and Place:
Suggestion Answer:
Question #: 99
Topic #: 1
DRAG DROP –
Refer to the exhibit above and click on the resource tabs in the top left corner to view resources to help with this question. Python code using the UCS Python
SDK is creating a server pool named “devcore_pool” and populating the pool with all servers from chassis 7, and then the server pool is associated to existing
Service Profile template “devcore_template”. Drag and drop the code from the left onto the item numbers on the right that match the missing sections in the
Python exhibit.
Select and Place:
Suggestion Answer:
Question #: 100
Topic #: 1
DRAG DROP –
Drag and drop the code from the bottom onto the box where the code is missing in the Python script to execute a REST API call to query all the NTP policy names and print the name of each policy. Not all options are used.
Select and Place:
Suggestion Answer:
Question #: 101
Topic #: 1
What are two features of On-Box Python for hosting an application on a network device? (Choose two.)
A. It has direct access to Cisco IOS XE CLI commands.
B. It is a Python interpreter installed inside the guest shell.
C. It enables execution of XML scripts on a Cisco IOS XE router or switch.
D. It supports Qt for graphical interfaces and dashboards.
E. It has access to Cisco IOS XE web UI through a controller.
Selected Answer: AB
Question #: 102
Topic #: 1
A bot has been created to respond to alarm messages. A developer is now creating a Webhook to allow the bot to respond to messages.
Which format allows the Webhook to respond to messages for the bot within Webex?
A. GET /messages?personId=me&roomId=NETWORK_STATUS Authorization: Bearer THE_BOTS_ACCESS_TOKEN
B. GET /messages?mentionedPeople=me&roomId=NETWORK_STATUS Authorization: Bearer THE_BOTS_ACCESS_TOKEN
C. GET /messages?mentionedBot=me&roomId=NETWORK_STATUS Authorization: Bearer THE_BOTS_ACCESS_TOKEN
D. GET /messages?botId=me&roomId=NETWORK_STATUS Authorization: Bearer THE_BOTS_ACCESS_TOKEN
Selected Answer: B
Question #: 103
Topic #: 1
An application has been developed for monitoring rooms in Cisco Webex. An engineer uses the application to retrieve all the messages from a Cisco Webex room, but the results are slowly presented.
Which action optimizes calls to retrieve the messages from the /v1/messages endpoint?
A. Define the ma property by using the pagination functionality.
B. Set the beforeMessage property to retrieve the messages sent before a specific message ID.
C. Avoid unnecessary calls by using a prior request to /v1/rooms to retrieve the last activity property.
D. Filter the response results by specifying the created property in the request.
Selected Answer: A
Question #: 104
Topic #: 1
DRAG DROP –
Drag and drop the code from the bottom onto the box where the code is missing in the diagram to show how data is processed in Webex. Not all options are used.
Select and Place:
Suggestion Answer:
Question #: 105
Topic #: 1
An application is developed in order to communicate with Cisco Webex. For reporting, the application must retrieve all the messages sent to a Cisco Webex room on a monthly basis.
Which action calls /v1/messages directly?
A. Set up a webhook that has messages as the resource type and store the results locally.
B. Utilize the pagination functionality by defining the max property.
C. Recursively call the /v1/messages endpoint by using the beforeMessage property.
D. Filter the response results by specifying the created property in the request.
Selected Answer: C
Question #: 106
Topic #: 1
Refer to the exhibits which show the documentation associated with the create port object API call in Cisco Firepower Threat Defense, and a cURL command.
Which data payload completes the cURL command to run the API call?
A. “icmpv4Type”: “ANY”, “name”: “string”, “type”: “icmpv4portobject”
B. “description”: “This is an ICMP Echo”, “icmpv4Code”: “8”, “icmpv4Type”: “Echo”, “isSystemDefined”: true, “name”: “ICMP Echo”, “version”: “2.2”
C. “description”: “string”, “icmpv4Code”: “ANY_IPV4”, “icmpv4Type”: “ANY”, “id”: “string”, “isSystemDefined”: “string”, “name”: “string”, “type”: “icmpv4portobject”, “version”: “string”
D. “description”: “string”, “icmpv4Code”: “ANY_IPV4”, “icmpv4Type”: null, “isSystemDefined”: true, “name”: “string”, “type”: “icmpv4portobject”
Selected Answer: A
Question #: 107
Topic #: 1
DRAG DROP –
Refer to the exhibit. Drag and drop the code snippets from the left onto the item numbers on the right that match the missing sections in the exhibit to complete the script to implement control flow.
Select and Place:
Suggestion Answer:
Question #: 108
Topic #: 1
An automated solution is needed to configure VMs in numerous cloud provider environments to connect the environments to an SDWAN. The SDWAN edge VM is provided as an image in each of the relevant clouds and can be given an identity and all required configuration via cloud-init without needing to log into the VM once online.
Which configuration management and/or automation tooling is needed for this solution?
A. Ansible
B. Intersight
C. HyperFlex
D. Terraform
Selected Answer: D
Question #: 109
Topic #: 1
DRAG DROP –
Refer to the exhibit. Drag and drop the code snippets from the bottom onto the blanks in the code to provision a new UCS server. Not all options are used.
Select and Place:
Suggestion Answer:
Question #: 110
Topic #: 1
What is a capability of the End User Monitoring feature of the AppDynamics platform?
A. discovers traffic flows, nodes, and transport connections where network or application/network issues are developing
B. monitoring local processes, services, and resource use, to explain problematic server performance
C. identifies the slowest mobile and IoT network requests, to locate the cause of problems
D. provides metrics on the performance of the database to troubleshoot performance-related issues
Selected Answer: C
Question #: 111
Topic #: 1
DRAG DROP –
Refer to the exhibit. A system administrator has installed a Linux-based alarm system in their home that can execute a Bash shell script when an intruder is detected. Drag and drop the code snippets from the left onto the item numbers on the right that match the missing sections in the exhibit to create a chat-ops script that will notify of alarms via the Webex REST API. Not all code snippets are used.
Select and Place:
Suggestion Answer:
Question #: 112
Topic #: 1
DRAG DROP –
Refer to the exhibit. The self-service Webex bot is failing when many users attempt to interact with it at the same time. Drag and drop the code snippets from the left onto the correct item numbers on the right that match the missing sections in the exhibit to complete this code to handle this high-load situation.
Select and Place:
Suggestion Answer:
Question #: 113
Topic #: 1
DRAG DROP –
Refer to the exhibit. A developer is creating a Python script to use the Webex REST API to list joined spaces, retry after the server-specified amount of time if a
`Too many requests` response is received, and print any other error that is received. Drag and drop the code snippets from the left onto the item numbers on the right that match the missing sections in the exhibit to complete the script. Not all code snippets are used.
Select and Place:
Suggestion Answer:
Question #: 114
Topic #: 1
DRAG DROP –
Drag and drop the code onto the snippet to update a SSID in Meraki using the Dashboard API. Not all options are used.
Select and Place:
Suggestion Answer:
Question #: 115
Topic #: 1
DRAG DROP –
Refer to the exhibit. Drag and drop the parts of the Python code from the left onto the item numbers on the right that match the missing sections in the exhibit that consumes REST API pagination.
Select and Place:
Suggestion Answer:
Question #: 116
Topic #: 1
DRAG DROP –
Drag and drop the code from the bottom onto the box where the code is missing to retrieve and display wireless network health information. The wireless network devices are being managed by Cisco DNA Center and are compatible with REST API. Not all options are used.
Select and Place:
Suggestion Answer:
Question #: 117
Topic #: 1
DRAG DROP –
Drag and drop the code from the bottom onto the box where the code is missing to create a Webex space. Not all options are used.
Select and Place:
Suggestion Answer:
Question #: 118
Topic #: 1
A local data center deployment using Cisco NX-OS switches is scaling and requires automatic configuration at scale. Configuration management must be set up for a Cisco NX-OS switch by using Ansible. The Ansible control server is currently located on a different subnet than the switch. The solution has these requirements:
✑ The transport protocol used must be encrypted.
✑ The connections must originate from a server in the same local network.
Enable mode must be supported.
Which connectivity method must be used?
A. HTTP through a web proxy.
B. HTTPS through a repository and ansible_become method for privilege escalation.
C. SSH through a bastion host and ansible_become method for privilege escalation.
D. XML-RPC through a web proxy.
Selected Answer: C
Question #: 119
Topic #: 1
A Cisco Catalyst 9000 switch has guest shell enabled. Which Linux command installs a third-party application?
A. apt-get install
B. zypper install
C. yum install
D. dnf install
Selected Answer: C
Question #: 120
Topic #: 1
DRAG DROP –
Drag and drop the code from the bottom onto the box where the code is missing to create a new Cisco Webex space and attach a previously configured bot named ‘sampleBot’. Not all options are used.
Select and Place:
Suggestion Answer: