SKIP THE SHIPPING
Use code NOSHIP during checkout to save 40% on eligible eBooks, now through January 5. Shop now.
Register your product to gain access to bonus material or receive a coupon.
This eBook includes the following formats, accessible from your Account page after purchase:
EPUB The open industry format known for its reflowable content and usability on supported mobile devices.
PDF The popular standard, used most often with the free Acrobat® Reader® software.
This eBook requires no passwords or activation to read. We customize your eBook by discreetly watermarking it with your name, making it uniquely yours.
A highly concentrated and focused review of the advanced network programmability and automation topics in alignment with the Cisco DEVCOR 350-901 exam blueprint.
Cisco DEVCOR 350-901 Study Guide is designed to help you practice and prepare for the Cisco Certified DevNet Professional exam: Developing Applications Using Cisco Core Platforms and APIs v1.0 (DEVCOR 350-901).
Review your skills measured by the objectives in these exam topics:
Download the sample pages (includes Section 2.3)
TABLE OF CONTENTS 6
TABLE OF FIGURES 8
INTRODUCTION 9
1. SOFTWARE DEVELOPMENT AND DESIGN 11
1.1 DESCRIBE DISTRIBUTED APPLICATIONS RELATED TO THE CONCEPTS OF FRONT END, BACK END, AND LOAD BALANCING 11
1.2 EVALUATE AN APPLICATION DESIGN CONSIDERING SCALABILITY AND MODULARITY 13
1.3 EVALUATE AN APPLICATION DESIGN CONSIDERING HIGH-AVAILABILITY AND RESILIENCY (INCLUDING ON-PREMISES,HYBRID, AND CLOUD) 15
1.4 EVALUATE AN APPLICATION DESIGN CONSIDERING LATENCY AND RATE-LIMITING 17
1.5 EVALUATE AN APPLICATION DESIGN AND IMPLEMENTATION CONSIDERING MAINTAINABILITY 19
1.6 EVALUATE AN APPLICATION DESIGN AND IMPLEMENTATION CONSIDERING OBSERVABILITY 20
1.7 DIAGNOSE PROBLEMS WITH AN APPLICATION GIVEN LOGS RELATED TO AN EVENT 21
1.8 EVALUATE CHOICE OF DATABASE TYPES WITH RESPECT TO APPLICATION REQUIREMENTS (SUCH AS RELATIONAL,DOCUMENT, GRAPH, COLUMNAR, AND TIME SERIES) 22
1.9 EXPLAIN ARCHITECTURAL PATTERNS (MONOLITHIC, SERVICES-ORIENTED, MICROSERVICES, AND EVENT-DRIVEN) 25
1.10 UTILIZE ADVANCED VERSION CONTROL OPERATIONS WITH GIT 31
1.10.A MERGE A BRANCH 35
1.10.B RESOLVE CONFLICTS 38
1.10.C GIT RESET 40
1.10.D GIT CHECKOUT 42
1.10.E GIT REVERT 43
1.11 EXPLAIN THE CONCEPTS OF RELEASE PACKAGING AND DEPENDENCY MANAGEMENT 45
1.12 CONSTRUCT A SEQUENCE DIAGRAM THAT INCLUDES API CALLS 47
1.13 CHAPTER 1 REVIEW QUESTIONS 49
2. USING APIS 55
2.1 IMPLEMENT ROBUST REST API ERROR HANDLING FOR TIMEOUTS AND RATE LIMITS 55
2.2 IMPLEMENT CONTROL FLOW OF CONSUMER CODE FOR UNRECOVERABLE REST API ERRORS 57
2.3 IDENTIFY WAYS TO OPTIMIZE API USAGE THROUGH HTTP CACHE CONTROLS 59
2.4 CONSTRUCT AN APPLICATION THAT CONSUMES A REST API THAT SUPPORTS PAGINATION 62
2.5 DESCRIBE THE STEPS IN THE OAUTH2 THREE-LEGGED AUTHORIZATION CODE GRANT FLOW 66
2.6 CHAPTER 2 REVIEW QUESTIONS 70
3. CISCO PLATFORMS 73
3.1 CONSTRUCT API REQUESTS TO IMPLEMENT CHATOPS WITH WEBEX API 73
3.2 CONSTRUCT API REQUESTS TO CREATE AND DELETE OBJECTS USING FIREPOWER DEVICE MANAGEMENT (FDM) 76
3.3 CONSTRUCT API REQUESTS USING THE MERAKI PLATFORM TO ACCOMPLISH THESE TASKS 80
3.3.A USE MERAKI DASHBOARD APIS TO ENABLE AN SSID 81
3.3.B USE MERAKI LOCATION APIS TO RETRIEVE LOCATION DATA 83
3.4 CONSTRUCT API CALLS TO RETRIEVE DATA FROM INTERSIGHT 85
3.5 CONSTRUCT A PYTHON SCRIPT USING THE UCS APIS TO PROVISION A NEW UCS SERVER GIVEN A TEMPLATE 87
3.6 CONSTRUCT A PYTHON SCRIPT USING THE CISCO DNA CENTER APIS TO RETRIEVE AND DISPLAY WIRELESS HEALTH INFORMATION 90
3.7 DESCRIBE THE CAPABILITIES OF APPDYNAMICS WHEN INSTRUMENTING AN APPLICATION 92
3.8 DESCRIBE STEPS TO BUILD A CUSTOM DASHBOARD TO PRESENT DATA COLLECTED FROM CISCO APIS 94
3.9 CHAPTER 3 REVIEW QUESTIONS 95
4. APPLICATION DEPLOYMENT AND SECURITY 97
4.1 DIAGNOSE A CI/CD PIPELINE FAILURE (SUCH AS MISSING DEPENDENCY, INCOMPATIBLE VERSIONS OF COMPONENTS, AND FAILED TESTS) 97
4.2 INTEGRATE AN APPLICATION INTO A PREBUILT CD ENVIRONMENT LEVERAGING DOCKER AND KUBERNETES 99
4.3 DESCRIBE THE BENEFITS OF CONTINUOUS TESTING AND STATIC CODE ANALYSIS IN A CI PIPELINE 103
4.4 UTILIZE DOCKER TO CONTAINERIZE AN APPLICATION 103
4.5 DESCRIBE THE TENETS OF THE "12-FACTOR APP" 109
4.6 DESCRIBE AN EFFECTIVE LOGGING STRATEGY FOR AN APPLICATION 111
4.7 EXPLAIN DATA PRIVACY CONCERNS RELATED TO STORAGE AND TRANSMISSION OF DATA 114
4.8 IDENTIFY THE SECRET STORAGE APPROACH RELEVANT TO A GIVEN SCENARIO 115
4.9 CONFIGURE APPLICATION-SPECIFIC SSL CERTIFICATES 117
4.10 IMPLEMENT MITIGATION STRATEGIES FOR OWASP THREATS (SUCH AS XSS, CSRF, AND SQL INJECTION) 122
4.11 DESCRIBE HOW END-TO-END ENCRYPTION PRINCIPLES APPLY TO APIS 125
4.12 CHAPTER 4 REVIEW QUESTIONS 127
5. INFRASTRUCTURE AND AUTOMATION 132
5.1 EXPLAIN CONSIDERATIONS OF MODEL-DRIVEN TELEMETRY (INCLUDING DATA CONSUMPTION AND DATA STORAGE) 132
5.2 UTILIZE RESTCONF TO CONFIGURE A NETWORK DEVICE INCLUDING INTERFACES, STATIC ROUTES, AND VLANS(IOS XE ONLY) 133
5.3 CONSTRUCT A WORKFLOW TO CONFIGURE NETWORK PARAMETERS WITH: 145
5.3.A ANSIBLE PLAYBOOK 145
5.3.B PUPPET MANIFEST 149
5.4 IDENTIFY A CONFIGURATION MANAGEMENT SOLUTION TO ACHIEVE TECHNICAL / BUSINESS REQUIREMENTS 150
5.5 DESCRIBE HOW TO HOST AN APPLICATION ON A NETWORK DEVICE (INCLUDING CATALYST 9000 AND CISCOIOX-ENABLED DEVICES) 152
5.6 CHAPTER 5 REVIEW QUESTIONS 156
6. APPENDIX A: RESTCONF URI DEMYSTIFIED (IOS XE) 159
7. APPENDIX B: ANSWERS TO CHAPTER REVIEW QUESTIONS 164
7.1 ANSWERS TO CHAPTER 1: SOFTWARE DEVELOPMENT AND DESIGN 164
7.2 ANSWERS TO CHAPTER 2: USING APIS 172
7.3 ANSWERS TO CHAPTER 3: CISCO PLATFORMS 176
7.4 ANSWERS TO CHAPTER 4: APPLICATION DEPLOYMENT AND SECURITY 180
7.5 ANSWERS TO CHAPTER 5: INFRASTRUCTURE AND AUTOMATION 186