Cisco 350-901 Exam (page: 13)
Cisco Developing Applications using Core Platforms and APIs (DEVCOR)
Updated on: 15-Feb-2026

Viewing Page 13 of 78

Which security approach should be used for developing a REST API?

  1. Add an API key to each URL string.
  2. Use custom security relevant HTTP response codes.
  3. Utilize CORS headers.
  4. Utilize TLS for end-to-end encryption.

Answer(s): D



Refer to the exhibit. The application follows a containerized microservices architecture that has one container per microservice. The microservices communicate with each other by using REST APIs. The double-headed arrows in the diagram display chains of synchronous HTTP calls needed for a single user request.

Which action ensures the resilience of the application in the scope of a single user request?

  1. Implement retries with exponential backoff during HTTP API calls.
  2. Set up multiple instances of each microservice in active/active mode by using the Orchestrator.
  3. Redesign the application to be separated into these three layers: Presentation, API, and Data.
  4. Create two virtual machines that each host an instance of the application and set up a cluster.

Answer(s): A



DRAG DROP (Drag and Drop is not supported)
Drag and drop the steps on the left into the order on the right for an end-user to access an OAuth2 protectedresource using the 'Authorization Code Grant' flow.

Select and Place:

  1. See Explanation section for answer.

Answer(s): A

Explanation:



In the three-legged OAuth2 authorization workflow, which entity grants access to a protected resource?

  1. resource owner
  2. client
  3. resource server
  4. authorization server

Answer(s): A


Reference:

https://developer.orange.com/tech_guide/3-legged-oauth/



What are two steps in the OAuth2 protocol flow? (Choose two.)

  1. The user is authenticated by the authorization server and granted an access token.
  2. The user’s original credentials are validated by the resource server and authorization is granted.
  3. The user indirectly requests authorization through the authorization server.
  4. The user requests an access token by authentication and authorization grant presentation.
  5. The user requests the protected resource from the resource server using the original credentials.

Answer(s): C,E


Reference:

https://www.digitalocean.com/community/tutorials/an-introduction-to-oauth-2



Viewing Page 13 of 78



Share your comments for Cisco 350-901 exam with other users:

hik 1/19/2024 1:47:00 PM

good content
UNITED STATES


Blessious Phiri 8/15/2023 2:18:00 PM

pdb and cdb are critical to the database
Anonymous


Zuned 10/22/2023 4:39:00 AM

till 104 questions are free, lets see how it helps me in my exam today.
UNITED STATES


Muhammad Rawish Siddiqui 12/3/2023 12:11:00 PM

question # 56, answer is true not false.
SAUDI ARABIA


Amaresh Vashishtha 8/27/2023 1:33:00 AM

i would be requiring dumps to prepare for certification exam
Anonymous


Asad 9/8/2023 1:01:00 AM

very helpful
PAKISTAN


Blessious Phiri 8/13/2023 3:10:00 PM

control file is the heart of rman backup
Anonymous


Senthil 9/19/2023 5:47:00 AM

hi could you please upload the ibm c2090-543 dumps
Anonymous


Harry 6/27/2023 7:20:00 AM

appriciate if you could upload this again
AUSTRALIA


Anonymous 7/10/2023 4:10:00 AM

please upload the dump
SWEDEN


Raja 6/20/2023 5:30:00 AM

i found some questions answers mismatch with explanation answers. please properly update
UNITED STATES


Doora 11/30/2023 4:20:00 AM

nothing to mention
Anonymous


deally 1/19/2024 3:41:00 PM

knowable questions
UNITED STATES


Sonia 7/23/2023 4:03:00 PM

very helpfull
UNITED STATES


binEY 10/6/2023 5:15:00 AM

good questions
Anonymous


Neha 9/28/2023 1:58:00 PM

its helpful
Anonymous


Desmond 1/5/2023 9:11:00 PM

i just took my oracle exam and let me tell you, this exam dumps was a lifesaver! without them, iam not sure i would have passed. the questions were tricky and the answers were obscure, but the exam dumps had everything i needed. i would recommend to anyone looking to pass their oracle exams with flying colors (and a little bit of cheating) lol.
SINGAPORE


Davidson OZ 9/9/2023 6:37:00 PM

22. if you need to make sure that one computer in your hot-spot network can access the internet without hot-spot authentication, which menu allows you to do this? answer is ip binding and not wall garden. wall garden allows specified websites to be accessed with users authentication to the hotspot
Anonymous


381 9/2/2023 4:31:00 PM

is question 1 correct?
Anonymous


Laurent 10/6/2023 5:09:00 PM

good content
Anonymous


Sniper69 5/9/2022 11:04:00 PM

manged to pass the exam with this exam dumps.
UNITED STATES


Deepak 12/27/2023 2:37:00 AM

good questions
SINGAPORE


dba 9/23/2023 3:10:00 AM

can we please have the latest exam questions?
Anonymous


Prasad 9/29/2023 7:27:00 AM

please help with jn0-649 latest dumps
HONG KONG


GTI9982 7/31/2023 10:15:00 PM

please i need this dump. thanks
CANADA


Elton Riva 12/12/2023 8:20:00 PM

i have to take the aws certified developer - associate dva-c02 in the next few weeks and i wanted to know if the questions on your website are the same as the official exam.
Anonymous


Berihun Desalegn Wonde 7/13/2023 11:00:00 AM

all questions are more important
Anonymous


gr 7/2/2023 7:03:00 AM

ques 4 answer should be c ie automatically recover from failure
Anonymous


RS 7/27/2023 7:17:00 AM

very very useful page
INDIA


Blessious Phiri 8/12/2023 11:47:00 AM

the exams are giving me an eye opener
Anonymous


AD 10/22/2023 9:08:00 AM

3rd so far, need to cover more
Anonymous


Matt 11/18/2023 2:32:00 AM

aligns with the pecd notes
Anonymous


Sri 10/15/2023 4:38:00 PM

question 4: b securityadmin is the correct answer. https://docs.snowflake.com/en/user-guide/security-access-control-overview#access-control-framework
GERMANY


H.T.M. D 6/25/2023 2:55:00 PM

kindly please share dumps
Anonymous