Free preview mode

Enjoy the free questions and consider upgrading to gain full access!

350-901Free trialFree trial

By cisco
Aug, 2025

Verified

25Q per page

Question 26

DRAG DROP -

Image 1

Refer to the exhibit. A developer is creating a Python script to use the Webex REST API to list joined spaces, retry after the server-specified amount of time if a
Too many requests response is received, and print any other error that is received. Drag and drop the code snippets from the left onto the item numbers on the right that match the missing sections in the exhibit to complete the script. Not all code snippets are used.
Select and Place:

Image 2

Question 27

Image 1

Refer to the exhibit. Which set of API requests must be executed by a Webex bot after receiving a webhook callback to process messages in a room and reply with a new message back to the same room?
A.

Image 2

B.

Image 3

C.

Image 4

D.

Image 5

Question 28

The Meraki API url https://api.meraki.com/api/v0/networks/123456789/ssids/2 has been stored in the environment variable meraki_url, and the API key has been stored in meraki_api_key.
Which snippet presents the correct API call to configure, secure, and enable an SSID using the Meraki API?
A.

Image 1

B.

Image 2

C.

Image 3

D.

Image 4

Question 29

FILL BLANK -
Fill in the blanks to complete the Python script to enable the SSID with a name of 371767916 in the network resource 11111111 using the Meraki Dashboard
API.

Image 1

Question 30

DRAG DROP -
Drag and drop the code onto the snippet to update a SSID in Meraki using the Dashboard API. Not all options are used.
Select and Place:

Image 1

Question 31

DRAG DROP -

Image 1

Refer to the exhibit. Drag and drop the parts of the Python code from the left onto the item numbers on the right that match the missing sections in the exhibit that consumes REST API pagination.
Select and Place:

Image 2

Question 32

DRAG DROP -
Drag and drop the code from the bottom onto the box where the code is missing to retrieve and display wireless network health information. The wireless network devices are being managed by Cisco DNA Center and are compatible with REST API. Not all options are used.
Select and Place:

Image 1

Question 33

DRAG DROP -
Drag and drop the code from the bottom onto the box where the code is missing to create a Webex space. Not all options are used.
Select and Place:

Image 1

Question 34

A local data center deployment using Cisco NX-OS switches is scaling and requires automatic configuration at scale. Configuration management must be set up for a Cisco NX-OS switch by using Ansible. The Ansible control server is currently located on a different subnet than the switch. The solution has these requirements:
✑ The transport protocol used must be encrypted.
✑ The connections must originate from a server in the same local network.
Enable mode must be supported.

Image 1

Which connectivity method must be used?

  • A: HTTP through a web proxy.
  • B: HTTPS through a repository and ansible_become method for privilege escalation.
  • C: SSH through a bastion host and ansible_become method for privilege escalation.
  • D: XML-RPC through a web proxy.

Question 35

Which database type should be used with highly structured data and provides support for ACID transactions?

  • A: time series
  • B: document
  • C: graph
  • D: relational

Question 36

A developer must create VLANs 2-5 on a remote Cisco NX-OS switch by using an Ansible playbook. The playbook must meet these requirements:
✑ Configure the VLANs and a name for each VLAN.
✑ Only run against the switches inventory group.
✑ Execute from the local Ansible controller.
✑ Prevent the collection of system information prior to execution.
Which playbook must be used?
A.

Image 1

B.

Image 2

C.

Image 3

D.

Image 4

Question 37

A Cisco Catalyst 9000 switch has guest shell enabled. Which Linux command installs a third-party application?

  • A: apt-get install <package-name>
  • B: zypper install <package-name>
  • C: yum install <package-name>
  • D: dnf install <package-name>

Question 38

Image 1

Refer to the exhibit. A Python script has these requirements:
✑ Retrieve a list of Bluetooth clients seen by the access points on a network.
✑ Print the content of the response.
✑ Retrieve the next page only if it is available in the response headers.
What must be added where the code is missing to get the remaining pages by using the next link from the link response header of the last request?
A.

Image 2

B.

Image 3

C.

Image 4

D.

Image 5

Question 39

DRAG DROP -
Drag and drop the code from the bottom onto the box where the code is missing to create a new Cisco Webex space and attach a previously configured bot named 'sampleBot'. Not all options are used.
Select and Place:

Image 1

Question 40

Image 1

Refer to the exhibit. A Python script must list network clients in the Cisco Meraki API that have used a network with an ID of 2. The number of client entries per returned page is restricted to 1,000 according to the API specification. Network 2 has 2,500 clients. What must be added where the code is missing to print the content of each response?
A.

Image 2

B.

Image 3

C.

Image 4

D.

Image 5

Question 41

There is a requirement to securely store unique usernames and passwords. Given a valid username, it is also required to validate that the password provided is correct.
Which action accomplishes this task?

  • A: Encrypt the username, hash the password, and store these values.
  • B: Hash the username, hash the password, and store these values.
  • C: Encrypt the username, encrypt the password, and store these values.
  • D: Hash the username, encrypt the password, and store these values.

Question 42

While developing an application following the 12-factor app methodology, which approach should be used in the application for logging?

  • A: Write a log to a file in the application directory.
  • B: Write a log to a file in /var/log.
  • C: Write the logs buffered to stdout.
  • D: Write the logs unbuffered to stdout.

Question 43

An application has initiated an OAuth authorization code grant flow to get access to an API resource on behalf of an end user.
Which two parameters are specified in the HTTP request coming back to the application as the end user grants access? (Choose two.)

  • A: access token and a refresh token with respective expiration times to access the API resource
  • B: access token and expiration time to access the API resource
  • C: redirect URI a panel that shows the list of permissions to grant
  • D: code that can be exchanged for an access token
  • E: state can be used for correlation and security checks

Question 44

A web application is susceptible to cross-site scripting.
Which two methods allow this issue to be mitigated? (Choose two.)

  • A: Use only drop downs.
  • B: Limit user input to acceptable characters.
  • C: Encrypt user input on the client side.
  • D: Use AES encryption to secure the script.
  • E: Remove all HTML/XML tags from user input.

Question 45

Why is end-to-end encryption deployed when exposing sensitive data through APIs?

  • A: Data transfers are untraceable from source to destination.
  • B: Data cannot be read or modified other than by the true source and destination.
  • C: Server-side encryption enables the destination to control data protection.
  • D: Traffic is encrypted and decrypted at every hop in the network path.

Question 46

Where should distributed load balancing occur in a horizontally scalable architecture?

  • A: firewall-side/policy load balancing
  • B: network-side/central load balancing
  • C: service-side/remote load balancing
  • D: client-side/local load balancing

Question 47

A developer deploys a SQLite database in a Docker container. Single-use secret keys are generated each time a user accesses the database. The keys expire after 24 hours.
Where should the keys be stored?

  • A: Outside of the Docker container in the source code of applications that connect to the SQLite database.
  • B: In a separate file inside the Docker container that runs the SQLite database.
  • C: In an encrypted database table within the SQLite database.
  • D: In a separate storage volume within the Docker container.

Question 48

While working with the Webex API, on an application that uses end-to-end encryption, a webhook has been received. What must be considered to read the message?

  • A: Webhook information cannot be used to read the message because of end-to-end encryption. The API key is needed to decrypt the message.
  • B: Webhook returns the full unencrypted message. Only the body is needed to query the API.
  • C: Webhook returns a hashed version of the message that must be unhashed with the API key.
  • D: Webhook returns message identification. To query, the API is needed for that message to get the decrypted information.

Question 49

When end-to-end encryption is implemented, which area is most vulnerable to exploitation?

  • A: cryptographic key exchange
  • B: endpoint security
  • C: cryptographic key generation
  • D: security of data in transit

Question 50

How do end-to-end encryption principles apply to APIs?

  • A: The owners of the service are prevented from accessing data that is being transferred.
  • B: Sensitive information is protected against backdoor attacks.
  • C: The API data is protected against man-in-the-middle attacks.
  • D: Both endpoints that are using the API resources are hardened against hacking.
Page 2 of 20 • Questions 26-50 of 485

Free preview mode

Enjoy the free questions and consider upgrading to gain full access!