لا تريد أن تفوت شيئا؟

نصائح اجتياز امتحان الشهادة

آخر أخبار الامتحانات ومعلومات الخصم

برعاية وحديثة من قبل خبرائنا

نعم، أرسل لي النشرة الإخبارية

خذ اختبارات أخرى عبر الإنترنت

السؤال #1
Many faults have occurred in the ACI environment and a sample of them needs to be examined. Which API call retrieves faults 30 through 45?
A. GET https://apic-ip-address/api/class/faultInfo
B. GET https://apic-ip-address/api/class/faultInfo
عرض الإجابة
اجابة صحيحة: D
السؤال #2
Which two statements are considered best practices according to the 12-factor app methodology for application design? (Choose two.)
A. Application code writes its event stream to stdout
B. Application log streams are archived in multiple replicated databases
E. Log files are aggregated into a single file on individual nodes
عرض الإجابة
اجابة صحيحة: AD
السؤال #3
Which two methods are API security best practices? (Choose two.)
A. Use tokens after the identity of a client has been established
B. Use the same operating system throughout the infrastructure
E. Use cloud hosting services to manage security configuration
عرض الإجابة
اجابة صحيحة: A
السؤال #4
Which two situations are flagged by software tools designed for dependency checking in continuous integration environments, such as OWASP? (Choose two.)
A. publicly disclosed vulnerabilities related to the included dependencies
B. mismatches in coding styles and conventions in the included dependencies C
E. buffer overflows to occur as the result of a combination of the included dependencies
عرض الإجابة
اجابة صحيحة: BC
السؤال #5
A cloud native project is being worked on in which all source code and dependencies are written in Python, Ruby, and/or JavaScnpt. A change in code triggers a notification to the CI/CD tool to run the CI/CD pipeline. Which step should be omitted from the pipeline?
A. Deploy the code to one or more environments, such as staging and/or production
B. Build one of more containers that package up code and all its dependencies
عرض الإجابة
اجابة صحيحة: A
السؤال #6
An organization manages a large cloud-deployed application that employs a microservices architecture across multiple data centers. Reports have received about application slowness. The container orchestration logs show that faults have been raised in a variety of containers that caused them to fail and then spin up brand new instances. Which two actions can improve the design of the application to identify the faults? (Choose two.)
A. Automatically pull out the container that fails the most over a time period
B. Implement a tagging methodology that follows the application execution from service to service
E. Implement an SNMP logging system with alerts in case a network link is slow
عرض الإجابة
اجابة صحيحة: D
السؤال #7
An organization manages a large cloud-deployed application that employs a microservices architecture. No notable issues occur with downtime because the services of this application are redundantly deployed over three or more data center regions. However, several times a week reports are received about application slowness. The container orchestration logs show faults in a variety of containers that cause them to fail and then spin up brand new. Which action must be taken to improve the resiliency design of
A. Update the base image of the containers
B. Test the execution of the application with another cloud services platform
عرض الإجابة
اجابة صحيحة: D
السؤال #8
Which two functions are performed by the load balancer when it handles traffic originating from the Internet destined to an application hosted on the file server farm? (Choose two.)
A. Terminate the TLS over the UDP connection from the router and originate an HTTPS connection to the selected server
B. Terminate the TLS over the UDP connection from the router and originate an HTTP connection to the selected server
E. Terminate the TLS over the SCTP connection from the router and originate an HTTPS connection to the selected server
عرض الإجابة
اجابة صحيحة: BE
السؤال #9
Where should distributed load balancing occur in a horizontally scalable architecture?
A. firewall-side/policy load balancing
B. network-side/central load balancing C
عرض الإجابة
اجابة صحيحة: D
السؤال #10
Which two statements about a stateless application are true? (Choose two.)
A. Different requests can be processed by different servers
B. Requests are based only on information relayed with each request
E. No state information can be shared across servers
عرض الإجابة
اجابة صحيحة: B
السؤال #11
A developer has completed the implementation of a REST API, but when it is executed, it returns a 401 error message. What must be done on the API to resolve the issue?
A. Access permission to the resource must be granted, before the request
B. Configure new valid credentials
عرض الإجابة
اجابة صحيحة: AC
السؤال #12
A developer has created an application based on customer requirements. The customer needs to run the application with the minimum downtime. Which design approach regarding high-availability applications, Recovery Time Objective, and Recovery Point Objective must be taken?
A. Active/passive results in lower RTO and RPO
B. Active/passive results in lower RTO and RPO
عرض الإجابة
اجابة صحيحة: A
السؤال #13
An application is hosted on Google Kubernetes Engine. A new JavaScript module is created to work with the existing application. Which task is mandatory to make the code ready to deploy?
A. Create a Dockerfile for the code base
B. Rewrite the code in Python
عرض الإجابة
اجابة صحيحة: B
السؤال #14
Which two data encoding techniques are supported by gRPC? (Choose two.) A.XML B.JSON C.ASCII D.ProtoBuf E.YAML
Which two data encoding techniques are supported by gRPC? (Choose two. A
عرض الإجابة
اجابة صحيحة: B
السؤال #15
Which statement about microservices architecture is true?
A. Applications are written in a single unit
B. It is a complex application composed of multiple independent parts
عرض الإجابة
اجابة صحيحة: AB
السؤال #16
What is the output of this IOS-XE configuration program?
A. interface operational status in IPv6 addresses
B. interface administrative status in IPv4 addresses
C. interface operational status in IPv4 addresses
D. interface administrative status in IPv6 addresses
عرض الإجابة
اجابة صحيحة: BD
السؤال #17
Which transport protocol is used by gNMI? A.HTTP/2 B.HTTP 1.1 C.SSH D.MQTT
Which transport protocol is used by gNMI? A. TTP/2 B
عرض الإجابة
اجابة صحيحة: DE
السؤال #18
A network operations team is using the cloud to automate some of their managed customer and branch locations. They require that all of their tooling be ephemeral by design and that the entire automation environment can be recreated without manual commands. Automation code and configuration state will be stored in git for change control and versioning. The engineering high-level plan is to use VMs in a cloud-provider environment then configure open source tooling onto these VMs to poll, test, and configure t
B. Ansible and Terraform C
E. Ansible and NSO
عرض الإجابة
اجابة صحيحة: AE
السؤال #19
Application sometimes store configuration as constants in the code, which is a violation of strict separation of configuration from code. Where should application configuration be stored?
A. environment variables
B. YAML files
C. Python libraries
D. Dockerfiles
E. INI files
عرض الإجابة
اجابة صحيحة: AB
السؤال #20
Which database type should be used with highly structured data and provides support for ACID transactions?
A. time series
B. document C
عرض الإجابة
اجابة صحيحة: D

عرض الإجابات بعد التقديم

يرجى إرسال البريد الإلكتروني الخاص بك والواتس اب للحصول على إجابات الأسئلة.

ملحوظة: يرجى التأكد من صلاحية معرف البريد الإلكتروني وWhatsApp حتى تتمكن من الحصول على نتائج الاختبار الصحيحة.

بريد إلكتروني:
رقم الواتس اب/الهاتف: