Cisco (350-901-DEVCOR) Exam Questions And Answers page 1
A developer is working on a bug fix. The existing branch named bugfix05328 needs to be merged with the current working primary branch named prim404880077 . All changes must be integrated into a single commit instead of preserving them as individual commits. Which git command must be used?
git merge squash bugfix05328
git rebase merge bugfix05328
git push rebase bugfix05328
Software Development and Design
Using APIs
Refer to the exhibit. Pipenv is used to manage dependencies. The test runs successfully on a local environment.
What is the reason for the error when running the test on a CI/CD pipeline?
All the unit tests in testsum.py failed.
Pytest did not detect any functions that start with 'test_'.
The pipfile in the local environment was not pushed to the remote repository.
Nose2 was not used as the test runner.
Cisco Core Platforms and APIs
Infrastructure and Automation
A client is written that uses a REST API to interact with a server. Using HTTPS as the transport, an HTTP request is sent and received an HTTP response. The response contains the HTTP response status code: 503 Service Unavailable.
Which action is the appropriate response?
Which action is the appropriate response?
Add an Authorization header that supplies appropriate credentials and sends the updated request.
Resend the request using HTTP as the transport instead of HTTPS.
Add an Accept header that indicates the content types that the client understands and send the updated request.
Look for a Retry-After header in the response and resend the request after the amount of time indicated.
Network Fundamentals
Using APIs
A developer is deploying an application to automate the configuration and management of Cisco network switches and routers. The application must use REST API interface to achieve programmability. The security team mandates that the network must be protected against DDoS attacks. What mitigates the attack without impacting genuine requests?
IP address filtering at the application layer
traffic routing on the network perimeter
API rate limiting at the application layer
firewall on the network perimeter
Cisco Core Platforms and APIs
Application Deployment and Security
Refer to the exhibit. The cURL POST request creates an OAuth access token for authentication with FDM API requests.
What is the purpose of the file @token_data that cURL is handling?
This file is a container to log possible error responses in the request.
This file is given as input to store the access token received from FDM.
This file is used to send authentication-related headers.
This file contains raw data that is needed for token authentication.
Network Fundamentals
Using APIs
A developer needs to configure an environment to orchestrate and configure.
Which two tools should be used for each task? (Choose two.)
Which two tools should be used for each task? (Choose two.)
Puppet for orchestration
Terraform for orchestration
Terraform for configuration
Ansible for orchestration
Ansible for configuration
Infrastructure and Automation
Infrastructure and Automation
In the three-legged OAuth2 process, after the authorization server presents a form to the resource owner to grant access, what is the next step?
The resource owner authenticates and optionally authorizes with the authorization server.
The user who owns the resource initiates a request to the OAuth client.
If the resource owner allows access, the authorization server sends the OAuth client a redirection.
A form to allow or restrict access is submitted by the owner of the resource.
Cisco Core Platforms and APIs
Network Fundamentals
Drag and drop the expressions from below onto the code to implement error handling. Not all options are used.
Application Deployment and Security
Infrastructure and Automation
Refer to the exhibit. The cisco_devnet Docker swarm service runs across five replicas. The development team tags and imports a new image named devnet/test:1.1 and requests that the image be upgraded on each container. There must be no service outages during the upgrade process. Which two design approaches must be used? (Choose two.)
Enable parallel upgrades by using the docker service update command.
Ensure that the service is hosted behind a VIP with no session persistence.
Ensure that the service replicas are set to a minimum of 5.
Update the restart policy of the containers to restart upon failure.
Implement rolling upgrades by using the docker service update command.
Application Deployment and Security
Infrastructure and Automation
Refer to the exhibit. A developer is creating a Python script to use the Webex REST API to list joined spaces, retry after the server-specified amount of time if a Too many requests response is received, and print any other error that is received. Drag and drop the code snippets from the left onto the item numbers on the right that match the missing sections in the exhibit to complete the script. Not all code snippets are used.
Infrastructure and Automation
Using APIs
Comments