Cisco 350-901 Exam
Developing Applications using Cisco Core Platforms and APIs (DEVCOR) (Page 3 )

Updated On: 1-Feb-2026

DRAG DROP (Drag and Drop is not supported)
Drag and drop the code from the bottom onto the box where the code is missing to construct a contact tracing application that dynamically returns all the Bluetooth clients on a given Meraki network. Not all options are used.
Select and Place:

  1. See Explanation section for answer.

Answer(s): A

Explanation:





Refer to the exhibit. A developer created a Python script to retrieve information about Meraki devices in a local network deployment. After requesting a security review of the code, the security analyst has observed poor secret storage practices. What is the appropriate secret storage approach?

  1. Set an OS environment variable for MER_API_KEY to the API key before running the code and no longer set MER_API_KEY within the code.
  2. Leverage an external secret vault to retrieve MER_API_KEY and set the vault key as an OS environment variable before running the code.
  3. Set the Base64 encoded version of the API key as MER_API_KEY in the code and Base64 decode before using in the header.
  4. Leverage an external secret vault to retrieve MER_API_KEY and embed the vault key as a new variable before running the code.

Answer(s): B





Refer to the exhibit. A Docker swarm service is currently running in a local data center. The service is hosting an HTML website. If the container fails, then the service becomes unavailable. The design must meet these requirements:

-The service must be highly available and resilient against a data center outage.
-The service must be accessible from a single URL.
-The HTTP session must remain on the server from which the original request was sent.
-Failure of the server must force the client to reconnect.

Which two design approaches must be used to meet the requirements? (Choose two.)

  1. Create another node in the swarm cluster to scale the service across the nodes over two replicas.
  2. Scale the Docker swarm service to 2 and set endpoint-mode to DNSRR instead of the default value of VIP.
  3. Configure an external load balancer to route requests to the swarm service by using session persistence.
  4. Configure a routing mesh to route requests to the swarm service by using NAT on the network side.
  5. Create another swarm cluster within a data center and deploy a secondary instance of the service.

Answer(s): A,C



DRAG DROP (Drag and Drop is not supported)



Refer to the exhibit. Drag and drop the code from the bottom onto the box where the code is missing to query the last 10 Bluetooth clients seen by APs in their network using the Meraki Dashboard API. Not all options are used.
Select and Place:

  1. See Explanation section for answer.

Answer(s): A

Explanation:



DRAG DROP (Drag and Drop is not supported)
Drag and drop the code from the bottom onto the box where the code is missing to permit network traffic between 10.0.0.0/8 and all other networks on port 80 for a Cisco Nexus 9000 switch by using the Puppet module. Not all options are used.
Select and Place:

  1. See Explanation section for answer.

Answer(s): A

Explanation:



Viewing page 3 of 78
Viewing questions 11 - 15 out of 507 questions



Post your Comments and Discuss Cisco 350-901 exam prep with other Community members:

Join the 350-901 Discussion