لا تريد أن تفوت شيئا؟

نصائح اجتياز امتحان الشهادة

آخر أخبار الامتحانات ومعلومات الخصم

برعاية وحديثة من قبل خبرائنا

نعم، أرسل لي النشرة الإخبارية

خذ اختبارات أخرى عبر الإنترنت

السؤال #1
What is a characteristic of a VLAN?
A.
B.
C.
D.
عرض الإجابة
اجابة صحيحة: A
السؤال #2
A developer is developing a web application that uses username and password to authenticate to the next service. The user credentials must be available at any time in the application. The developer must choose and implement a secure method of storing the authentication credentials that are used in the automation code. Which password handling method must be used to minimize the security risk?
A.
B.
C.
D.
عرض الإجابة
اجابة صحيحة: D
السؤال #3
Which Python data type resembles JSON data structures?
A. uple
B. ist
C. ictionary
D. trin
عرض الإجابة
اجابة صحيحة: C
السؤال #4
A team of developers is responsible for a network orchestration application in the company. The responsibilities also include:developing and improving the application in a continuous mannerdeployment of the application and management of CI/CD frameworksmonitoring the usage and problems and managing the performance improvements Which principle best describes this DevOps practice?
A. nd-to-end responsibility
B. uality assurance checks
C. utomation of processes
D. esponsible for IT operation
عرض الإجابة
اجابة صحيحة: C
السؤال #5
Which type of HTTP method is used by the Meraki and Webex APIs to send webhook notifications?
A. TTP GET
B. TTP PUT
C. TTP HEAD
D. TTP POS
عرض الإجابة
اجابة صحيحة: D
السؤال #6
Which API is used to change the configuration of a device group that contains Cisco Catalyst 9000 Series Switches?
A. isco IOS XE
B. API
C. TAPI
D. isco Finess
عرض الإجابة
اجابة صحيحة: A
السؤال #7
A developer creates a new application, but the application must be tested before being released to a customer. When a mobile phone that uses 4G is used to access the application, the request fails. Why does the connection to the application fail?
A.
B.
C.
D.
عرض الإجابة
اجابة صحيحة: D
السؤال #8
An executive team wants to reduce subscription costs. An application that currently uses cloud hosting services has been identified as a candidate to migrate to internal infrastructure. A detailed proof of concept has been requested from the development team to compare the components of bare metal deployments. Which two attributes are used to identify the required application deployment on bare metal servers?
A. osting infrastructure is distributed as a single tenant
B. esources scaled up quickly to meet demand
C. t provides direct access to physical resources for the operating systems
D. t has lower resource consumption than other deployment types
E. t performs on top of an existing virtualized environment
عرض الإجابة
اجابة صحيحة: AC
السؤال #9
Which Cisco product has deployment options of software or purpose-built platforms to provide network security and traffic management in an integrated suite?
A.
B.
C.
D.
عرض الإجابة
اجابة صحيحة: B
السؤال #10
Which application should be used to externally access all applications deployed in the same host machine with a single public IP address and port, when each application listens on different local ports?
A.
B.
C.
D.
عرض الإجابة
اجابة صحيحة: B
السؤال #11
Which platform has an API that has the capability to obtain a list of vulnerable software on user devices?
A.
B.
C.
D.
عرض الإجابة
اجابة صحيحة: D
السؤال #12
What are two considerations when selecting the "best route" for a network device to reach its destination?
A. etrics
B. ubnet mask
C. P address
D. AC address
E. dministrative distanc
عرض الإجابة
اجابة صحيحة: AE
السؤال #13
What is the first development task in test-driven development?
A. rite a passing test case for existing code
B. everse engineer the code for a desired function
C. rite code that implements a desired function
D. rite a failing test case for a desired function
عرض الإجابة
اجابة صحيحة: D
السؤال #14
An engineer must configure Cisco Nexus devices and wants to automate this workflow. The engineer will use an Ansible playbook to configure devices through Cisco NX REST API. Before the code is run, which resource must be used to verify that the REST API requests work as expected?
A. isco Code Exchange for Nexus
B. isco Learning Labs
C. isco Open NX-OS
D. isco NX-OS SD
عرض الإجابة
اجابة صحيحة: B
السؤال #15
Which command reverses the last commit without changing the index file or the working tree position?
A. it reset --soft HEAD^
B. it reset --hard HEAD~3
C. it revert HEAD
D. it rever
عرض الإجابة
اجابة صحيحة: A
السؤال #16
A new application is being developed that must be hardware independent. The application includes an administrative component which is accessed using a Windows desktop GUI. Installation and management of the environment must be fully automated. Which application deployment type meets the requirements?
A. are metal
B. irtual Python environment
C. ontainer
D. irtual machin
عرض الإجابة
اجابة صحيحة: C
السؤال #17
When a developer sends an HTTP request to an API, which two elements are expected in an HTTP response?
A. tatus code
B. eaders
C. OST request
D. ET request
E. cript
عرض الإجابة
اجابة صحيحة: AB
السؤال #18
A developer creates a web application that receives a username and password and uses them to sync the credentials to other services through HTTPS. API keys to services are part of the configuration files of the application, but the credentials to the database that stores the synchronization logs are obtained through an external vault service. What is the security issue in this scenario?
A. ommunication between the application and the services is not encrypted
B. he database credentials should be stored in the configuration files so that they are secured on the same server
C. he synchronization logs should be encrypted and not stored in a relational database
D. he API keys are stored in the configuration files but should be stored in the vault service
عرض الإجابة
اجابة صحيحة: D
السؤال #19
Users cannot access a webserver and after the traffic is captured, the capture tool shows an ICMP packet that reports "time exceeded in-transit". What is the cause of this webserver access issue?
A. he server is overloaded and the connection was not able to be processed in time
B. router along the path has the wrong time
C. he large distance between the server and the users means that the packets require too much time to reach the destination
D. router along the path is misrouting the packets in a wrong direction
عرض الإجابة
اجابة صحيحة: D
السؤال #20
To which stage of development do Infrastructure as Code principles relate?
A.
B.
C.
D.
عرض الإجابة
اجابة صحيحة: B
السؤال #21
What are two benefits of using version control?
A. t provides a complete long-term change history of every file of an application
B. t executes tests and reveals compilation errors before the code is committed
C. t enables multiple team members to work on the same project simultaneously
D. t provides automation of the build and deployment process out of the box
E. t improves code availability by distributing the data across different machines
عرض الإجابة
اجابة صحيحة: AC
السؤال #22
What is a comparison of YAML and JSON?
A. SON has more common usage in configuration management tools compared to YAML
B. AML has a more consistent approach to representing data compared to JSON
C. SON does not support comments and YAML does
D. AML is a more verbose data structure compared to JSON
عرض الإجابة
اجابة صحيحة: C
السؤال #23
A company needs a solution to back up data that is generated by a Java application to a local disk. The data must be transferred from on-premises to cloud storage by using SCP. A security policy requires the encryption of the data in transit and at rest. Which two configurations must be implemented to meet the security policy requirements?
A. PN for the Java application
B. ncryption of the remote filesystem
C. Psec for the Java application
D. LS for the Java application
E. ncryption of the local filesyste
عرض الإجابة
اجابة صحيحة: BD
السؤال #24
Calling a REST API returns a 404 error. What does this code represent?
A. he URI being requested is incorrect
B. query parameter is missing
C. header is missing
D. he payload is formatted incorrectly
عرض الإجابة
اجابة صحيحة: A
السؤال #25
What is a benefit of using functions in the code for the development process?
A. etter user experience in the end product
B. asier to compile the code
C. aster code development
D. mproves code performanc
عرض الإجابة
اجابة صحيحة: C
السؤال #26
What is a capability of the NETCONF protocol?
A. llows XML messages to be exchanged via the SSH protocol
B. xposes a web-based interface
C. llows Python scripts to be executed externally from a network device
D. ses JSON to encode data in its content laye
عرض الإجابة
اجابة صحيحة: A
السؤال #27
An HTTP request to a REST API gets a response with a 401 status code. What does this mean?
A. ccess to that API resource is forbidden
B. ncorrect authentication credentials were provided
C. he API backend had an unhandled exception
D. he requested URI does not exis
عرض الإجابة
اجابة صحيحة: B
السؤال #28
Which configuration management tool has an agentless capability?
A.
B.
C.
D.
عرض الإجابة
اجابة صحيحة: A
السؤال #29
A company needs to migrate internal applications to the cloud to optimize scalability and reliability as well as to reduce the effort of managing the infrastructure. The company plans to host the infrastructure on private dedicated servers that are rented from a cloud provider. The servers must be accessible only from the company network. The company also plans to temporarily scale the infrastructure out to non-dedicated servers of a cloud provider. Which application deployment model must the organization i
A. dge computing
B. ublic cloud
C. ybrid cloud
D. rivate clou
عرض الإجابة
اجابة صحيحة: C

عرض الإجابات بعد التقديم

يرجى إرسال البريد الإلكتروني الخاص بك والواتس اب للحصول على إجابات الأسئلة.

ملحوظة: يرجى التأكد من صلاحية معرف البريد الإلكتروني وWhatsApp حتى تتمكن من الحصول على نتائج الاختبار الصحيحة.

بريد إلكتروني:
رقم الواتس اب/الهاتف: