November 17, 2020

350-901 Developing Applications using Cisco Core Platforms and APIs (DEVCOR 350-901) Exam

 

Exam overview
This exam tests your knowledge of software development and design, including:

Using APIs
Cisco platforms
Application deployment and security
Infrastructure and automation

Exam Description:
Developing Applications using Cisco Core Platforms and APIs v1.0 (DEVCOR 350-901)is a 120-minute exam associated with the DevNet Professional Certification. This exam tests acandidate's knowledge of software development and design including using APIs, Cisco platforms,application deployment and security, and infrastructure and automation. The course, DevelopingApplications using Cisco Core Platforms and APIs helps candidates to prepare for this exam.
The following topics are general guidelines for the content likely to be included on the exam. However, other related topics may also appear on any specific delivery of the exam. To better reflect the contents of the exam and for clarity purposes, the guidelines below may change at any time without notice.

20% 1.0 Software Development and Design
1.1 Describe distributed applications related to the concepts of front-end, back-end, and load balancing
1.2 Evaluate an application design considering scalability and modularity
1.3 Evaluate an application design considering high-availability and resiliency (including on-premises, hybrid, and cloud)
1.4 Evaluate an application design considering latency and rate limiting
1.5 Evaluate an application design and implementation considering maintainability
1.6 Evaluate an application design and implementation considering observability
1.7 Diagnose problems with an application given logs related to an event
1.8 Evaluate choice of database types with respect to application requirements (such as relational, document, graph, columnar, and Time Series)
1.9 Explain architectural patterns (monolithic, services oriented, microservices, and event driven)
1.10 Utilize advanced version control operations with Git
1.10.a Merge a branch
1.10.b Resolve conflicts
1.10.c git reset
1.10.d git checkout
1.10.e git revert
1.11 Explain the concepts of release packaging and dependency management
1.12 Construct a sequence diagram that includes API calls

20% 2.0 Using APIs
2.1 Implement robust REST API error handling for time outs and rate limits
2.2 Implement control flow of consumer code for unrecoverable REST API errors
2.3 Identify ways to optimize API usage through HTTP cache controls
2.4 Construct an application that consumes a REST API that supports pagination
2.5 Describe the steps in the OAuth2 three-legged authorization code grant flow
2019 Cisco Systems, Inc. This document is Cisco Public. Page 2

20% 3.0 Cisco Platforms

3.1 Construct API requests to implement chatops with Webex Teams API
3.2 Construct API requests to create and delete objects using Firepower device management (FDM)
3.3 Construct API requests using the Meraki platform to accomplish these tasks
3.3.a Use Meraki Dashboard APIs to enable an SSID
3.3.b Use Meraki location APIs to retrieve location data
3.4 Construct API calls to retrieve data from Intersight
3.5 Construct a Python script using the UCS APIs to provision a new UCS server given a template
3.6 Construct a Python script using the Cisco DNA center APIs to retrieve and display wireless health information
3.7 Describe the capabilities of AppDynamics when instrumenting an application
3.8 Describe steps to build a custom dashboard to present data collected from Cisco APIs

20% 4.0 Application Deployment and Security

4.1 Diagnose a CI/CD pipeline failure (such as missing dependency, incompatible versions of components, and failed tests)
4.2 Integrate an application into a prebuilt CD environment leveraging Docker and Kubernetes
4.3 Describe the benefits of continuous testing and static code analysis in a CI pipeline
4.4 Utilize Docker to containerize an application
4.5 Describe the tenets of the "12-factor app"
4.6 Describe an effective logging strategy for an application
4.7 Explain data privacy concerns related to storage and transmission of data
4.8 Identify the secret storage approach relevant to a given scenario
4.9 Configure application specific SSL certificates
4.10 Implement mitigation strategies for OWASP threats (such as XSS, CSRF, and SQL injection)
4.11 Describe how end-to-end encryption principles apply to APIs

20% 5.0 Infrastructure and Automation
5.1 Explain considerations of model-driven telemetry (including data consumption and data storage)
5.2 Utilize RESTCONF to configure a network device including interfaces, static routes, and VLANs (IOS XE only)
5.3 Construct a workflow to configure network parameters with:
5.3.a Ansible playbook
5.3.b Puppet manifest
5.4 Identify a configuration management solution to achieve technical and business requirements
5.5 Describe how to host an application on a network device (including Catalyst 9000 and Cisco IOx-enabled devices)

QUESTION 1
A developer has created an application based on customer requirements. The customer needs to run the
application with the minimum downtime. Which design approach regarding high-availability applications,
Recovery Time Objective, and Recovery Point Objective must be taken?

A. Active/passive results in lower RTO and RPO. For RPO, data synchronization between the two data
centers must be timely to allow seamless request flow.
B. Active/passive results in lower RTO and RPO. For RPO, data synchronization between the two data
centers does not need to be timely to allow seamless request flow.
C. Active/active results in lower RTO and RPO. For RPO, data synchronization between the two data centers
does not need to be timely to allow seamless request flow.
D. Active/active results in lower RTO and RPO. For RPO, data synchronization between the two data centers
must be timely to allow seamless request flow.

Correct Answer: A

QUESTION 2
A cloud native project is being worked on in which all source code and dependencies are written in Python,
Ruby, and/or JavaScnpt. A change in code triggers a notification to the CI/CD tool to run the CI/CD pipeline.
Which step should be omitted from the pipeline?

A. Deploy the code to one or more environments, such as staging and/or production.
B. Build one of more containers that package up code and all its dependencies.
C. Compile code.
D. Run automated tests to validate the correctness.


QUESTION 3
Which two statements are considered best practices according to the 12-factor app methodology for application design? (Choose two.)

A. Application code writes its event stream to stdout.
B. Application log streams are archived in multiple replicated databases.
C. Application log streams are sent to log indexing and analysis systems.
D. Application code writes its event stream to specific log files.
E. Log files are aggregated into a single file on individual nodes.

Correct Answer: AD

QUESTION 4
An organization manages a large cloud-deployed application that employs a microservices architecture. No
notable issues occur with downtime because the services of this application are redundantly deployed over
three or more data center regions. However, several times a week reports are received about application
slowness. The container orchestration logs show faults in a variety of containers that cause them to fail and
then spin up brand new.
Which action must be taken to improve the resiliency design of the application while maintaining current scale?

A. Update the base image of the containers.
B. Test the execution of the application with another cloud services platform.
C. Increase the number of containers running per service.
D. Add consistent “try/catch(exception)” clauses to the code.

Correct Answer: D

Actualkey Cisco 350-901 Exam pdf, Certkingdom Cisco 350-901 PDF

MCTS Training, MCITP Trainnig

Best Cisco 350-901 Certification, Cisco 350-901 Training at certkingdom.com

Bookmark and Share