Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

Cisco 350-901 - Developing Applications using Cisco Core Platforms and APIs (DEVCOR)

Page: 11 / 11
Total 363 questions

An application must be able to print the values of the variables in specific modules. Different message levels will be used for production and for development. Proof of access and activity must be documented. What must be included in the implementation to support these observability requirements?

A.

print

B.

metrics

C.

logging

D.

streaming

A Cisco Catalyst 9000 switch has guest shell enabled. Which Linux command installs a third-party application?

A.

yum Install

B.

apt-get install

C.

zypper install

D.

dnf install

Refer to the exhibit.

Many faults have occurred in the ACI environment and a sample of them needs to be examined. Which API call retrieves faults 30 through 45?

A.

GET https://apic-ip-address/api/class/faultInfo.json?order-by=faultinst.severity|desc &page=1&page- size=15

B.

GET https://apic-ip-address/api/class/faultInfo.json?order-by=faultinst.severity|desc &page=2&page- size=15

C.

GET https://apic-ip-address/api/class/faultInfo.json?order-by=faultinst.severity|desc &page=30

D.

GET https://apic-ip-address/api/class/faultInfo.json?order-by=faultinst.severity|desc &page=2&page- size=30

Refer to the exhibit.

A developer created a Python script to retrieve information about Meraki devices in a local network deployment After requesting a security review of the code the security analyst has observed poor secret storage practices What is the appropriate secret storage approach''

A.

Set the Base64 encoded version of the API key as MER_API_KEY m the code and Base64 decode before using m the header

B.

Leverage an external secret vault to retrieve MER_API_KEY and embed the vault key as a new variable before running the code

C.

Leverage an external secret vault to retrieve MER_APl_KEY and set the vault key as an OS environment variable before running the code

D.

Set an OS environment variable for MER_API_KEY to the API key before running the code and no longer set MER_API_KEY within the code

A developer is creating a Python script to analyze errors during REST API call operations. The script will be used with Cisco solution and devices. Drag and drop the code from the bottom to the box where the code is missing to implement control flow for handling unrecoverable REST API calls. Not all options are used.

A developer is creating a Python script to use the Webex REST API to list joined spaces and handle and print the errors it receives. Drag and drop the code from the bottom of the code snippet onto the blanks in the code to complete the script. Not all options are used.

What is the unique identifier in the 0Auth2 three-legged authorization code flow?

A.

client ID

B.

resource server

C.

resource owner

D.

authorization server

Which two gRPC modes of model-driven telemetry are supported on Cisco IOS XE Software? (Choose two.)

A.

dial-in

B.

dial-out

C.

call-in

D.

call-out

E.

passive