Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

Cisco 350-901 - Developing Applications using Cisco Core Platforms and APIs (DEVCOR)

Page: 10 / 11
Total 363 questions

How is AppDynamics used to instrument an application?

A.

Provides visibility into the transaction logs that can be correlated to specific business transaction requests

B.

Enables instrumenting a backend web server (or packet installation by using an AppDynamics agent

C.

Retrieves a significant amount of information from the perspective of the database server by using application monitoring

D.

Monitors traffic flows by using an AppDynamics agent installed on a network infrastructure device

A network operations team is using the cloud to automate some of their managed customer and branch locations. They require that all of their tooling be ephemeral by design and that the entire automation environment can be recreated without manual commands. Automation code and configuration state will be stored in git for change control and versioning. The engineering high-level plan is to use VMs in a cloud- provider environment then configure open source tooling onto these VMs to poll, test, and configure the remote devices, as well as deploy the tooling itself.

Which configuration management and/or automation tooling is needed for this solution?

A.

Ansible

B.

Ansible and Terraform

C.

NSO

D.

Terraform

E.

Ansible and NSO

Refer to the exhibit above and click on the IETF Routing tab in the top left corner to help with this question. A developer is trying to update the routing instance by adding a new route to the routes list using the URL in the exhibit. What action must be taken to fix the error being received?

A.

Fix the body being sent to update the routes list.

B.

Update the authorization credentials.

C.

Change the url to ''/ietf-routing:routing/routing-instance=default''.

D.

Change the URL to ''/ietf-routing:routing-instance/default''.

E.

Change the HTTP Method being used to make the change

Which type of file is created from issued intermediate, root, and primary certificates for SSL installation on a server?

A.

DER

B.

CSR

C.

PEM

D.

CRT

A developer is creating a Python script to use the Webex Teams REST API to list joined spaces, and gracefully handle and print the errors it receives. Drag and drop the code snippets from the left onto the item numbers on the right that match the missing sections in the exhibit to complete the script.

Refer to the exhibit. The self-service Webex Teams bot is failing when many users attempt to interact with it at the same time. Drag and drop the code snippets from the left onto the correct item numbers on the right that match the missing sections in the exhibit to complete this code to handle this high-load situation.

How is an OAulh2 three-legged authentication flow initiated?

A.

The user makes a roquost to the OAuth client

B.

Exchange the key f

C.

Construct an API call to retrieve the credentials.

D.

Get the authorization code.

Refer to the exhibit.

Refer to the exhibit A Docker swarm service is currently running m a local data center The service is hosting an HTML website it the container fads then the service becomes unavailable The design must meet these requirements

• The service must be highly available and resilient against a data center outage.

• The service must be accessible from a single URL

• The HTTP session must remain on the server from which the original request was sent

• Failure of the server must force the client to reconnect

Which two design approaches must be used to meet the requirements? (Choose two.)

A.

Create another swarm cluster within a data center and deploy a secondary instance of the service.

B.

Create another node in the swarm duster to scale the service across the nodes over two replicas.

C.

Configure an external load balancer to route requests to the swarm service by using session persistence

D.

Scale the Docker swarm service to 2 and set endpoint-mode to DNSRR instead of the default value of VIP

E.

Configure a routing mesh to route requests to the swarm service by using NAT on the network side

An application uses OAuth to get access to several API resources on behalf of an end user. What are two valid parameters to send to the authorization server as part of the first step of an authorization code grant flow? (Choose two.)

A.

URI to which the authorization server will send the user-agent back when access is granted or denied

B.

list of the API resources that the application is requesting to access

C.

secret that was generated by the authorization server when the application registered as an OAuth integration

D.

list of scopes that correspond to the API resources to which the application is requesting to access

E.

name of the application under which the application registered as an OAuth integration

Users report that they are no longer able to process transactions with the online ordering application, and the logging dashboard is

displaying these messages:

Fri Jan 10 19:37:31.123 ESI 2020 [FRONTEND] [NFO: Incoming request to add item to cart from user 45834534858

Fri Jan 10 19:37:31.247 EST 2020 [BACKEND] INFO: Attempting to add item to cart

Fri Jan 10 19:37:31.250 EST 2020 [BACKEND] ERROR: Failed to add item: MYSQLDB ERROR: Connection refused

What is causing the problem seen in these log messages?

A.

The database server container has crashed.

B.

The backend process is overwhelmed with too many transactions.

C.

The backend is not authorized to commit to the database.

D.

The user is not authorized to add the item to their cart.