لا تريد أن تفوت شيئا؟

نصائح اجتياز امتحان الشهادة

آخر أخبار الامتحانات ومعلومات الخصم

برعاية وحديثة من قبل خبرائنا

نعم، أرسل لي النشرة الإخبارية

خذ اختبارات أخرى عبر الإنترنت

السؤال #1
A developer is asked to implement an infrastructure pipeline within the organization. To implement the infrastructure pipeline, the developer must identify the methods that are required for storing and working with credentials, such as API key, usernames, and passwords. Which two methods must be used?
A. nject the secrets into the pipeline at runtime
B. mplement a secret store, such as Vault
C. se SHA-1 hashing and store in a version control system
D. tore the secrets in a vars file, and encrypt and store in a version control system
E. tore the secrets in a text file on your local machine
عرض الإجابة
اجابة صحيحة: AB
السؤال #2
What is the frequency of monitoring data updates when using model-driven telemetry?
A. eal time
B. very day
C. very 5 minutes
D. very hou
عرض الإجابة
اجابة صحيحة: A
السؤال #3
Which interface provides an IOx application on a Catalyst 9000 Series switch access to the network?
A. ppGigabitEthernet 1/0/1
B. oopback 1
C. igabitEthernet 1/0/1
D. ppLoopback
عرض الإجابة
اجابة صحيحة: A
السؤال #4
An application is made up of multiple microservices, each communicating via APIs. One service is beginning to be a bottleneck for the application because it can take a lot of time to complete requests. An engineer tried adding additional instances of this service behind the load balancer, but it did not have any effect. Which application design change must be implemented in this scenario?
A. ove from synchronous to asynchronous interactions with the service and implement a message queue
B. eploy an API gateway to centralize all inbound communication requests and offload authentication
C. endor all dependencies into the service that is causing delays to remove external dependency checks
D. everage serverless architecture instead of containers to gain the advantage of event driven APIs
عرض الإجابة
اجابة صحيحة: A
السؤال #5
A new monitoring solution has these requirements:Collect real-time telemetry.Pull SNMP data from all network devices.Visualize data in graphs.Which type of database should be used to store the data?
A. elational database
B. ocument database
C. raph database
D. ime-series databas
عرض الإجابة
اجابة صحيحة: D
السؤال #6
A developer is developing a microservices code to manage REST API errors. Which two approaches must the developer take to manage the HTTP 429 "Too Many Requests" status code in the microservices code?
A. esend the request immediately without implementing a wait time
B. hrow an exception in the application code
C. eturn errors in the response code
D. mplement subsequent retry with the same interval window
E. onsecutive retries should truncate exponential backoff
عرض الإجابة
اجابة صحيحة: CE
السؤال #7
A developer designs and builds an API to interact with a large database that is hosted in the public cloud. The developer is concerned about database performance because the database is shared between production and non-production systems. Which approach provides protection to the database from excessive load?
A. ost the API on a public cloud platform to take advantage of auto-scaling
B. nsure that only valid users can access the API
C. ake the API offline if database utilization exceeds a predefined threshold
D. ate limit requests to the AP
عرض الإجابة
اجابة صحيحة: D
السؤال #8
Which function does Fluentd fulfill for application logging in Kubernetes?
A. ogging agent for distribution
B. essaging/queueing infrastructure
C. ackend time series database storage
D. onitoring and log visualizatio
عرض الإجابة
اجابة صحيحة: A
السؤال #9
An application is made up of multiple microservices, each communicating via APIs. One service is beginning to be a bottleneck for the application because it can take a lot of time to complete requests. An engineer tried adding additional instances of this service behind the load balancer, but it did not have any effect. Which application design change must be implemented in this scenario?
A. ove from synchronous to asynchronous interactions with the service and implement a message queue
B. eploy an API gateway to centralize all inbound communication requests and offload authentication
C. endor all dependencies into the service that is causing delays to remove external dependency checks
D. everage serverless architecture instead of containers to gain the advantage of event driven APIs
عرض الإجابة
اجابة صحيحة: A
السؤال #10
Which solution is used to manage automatic dependencies on a Cisco NCS device using Cisco IOS XR Software?
A. lexible packaging
B. I/CD pipelines
C. eer code reviews
D. utomated deployment
عرض الإجابة
اجابة صحيحة: A
السؤال #11
In a Server Hello TLS handshake message, which parameter is provided as part of an RSA key exchange in addition to the server SSL certificate and the cipher suite?
A. remaster secret
B. erver random bytes
C. rivate key
D. ession key
عرض الإجابة
اجابة صحيحة: B
السؤال #12
What are two principles according to the build, release, run principle of the twelve-factor app methodology?
A. ode changes are able to be made at runtime
B. eparation between the build, release, and run phases
C. eleases should have a unique identifier
D. xisting releases are able to be mutated after creation
E. elease stage is responsible for compilation of assets and binaries
عرض الإجابة
اجابة صحيحة: BC
السؤال #13
In an event-driven architecture-based system, what is a characteristic of the subscribers of a topic?
A. hey have access to all the messages in a topic
B. he message is channeled by recognizing the message's function
C. he messages received must be stamped with information that identifies the sender
D. hey route each incoming message to its destination
عرض الإجابة
اجابة صحيحة: A
السؤال #14
What is a benefit of running multiple instances of a back-end service and using load balancing to distribute the communication between the front-end and back-end services?
A. he total load on the database servers decreases
B. igh availability is provided for the back-end services
C. he consistency of data for stateful services increases
D. caling horizontally is automated out of the box
عرض الإجابة
اجابة صحيحة: B
السؤال #15
A developer is designing a modern, distributed microservice enterprise application. The application will be integrating with other systems and focus on a large deployment, so control of API calls is necessary. What is the best practice to reduce application response latency and protect the application from excessive use?
A. mplement rate limiting on the client and server sides
B. mplement rate limiting on the server side
C. mplement rate limiting on the client side
D. o not enforce any rate limiting
عرض الإجابة
اجابة صحيحة: A
السؤال #16
What is a capability of AppDynamics when instrumenting an application?
A. t collects performance data
B. t accelerates dependency installations
C. t removes unwanted configuration
D. t retrieves configuration changes from repositories
عرض الإجابة
اجابة صحيحة: A
السؤال #17
A new monitoring solution has these requirements:Collect real-time telemetry.Pull SNMP data from all network devices.Visualize data in graphs.Which type of database should be used to store the data?
A. elational database
B. ocument database
C. raph database
D. ime-series databas
عرض الإجابة
اجابة صحيحة: D
السؤال #18
How does TLS security address data privacy concerns regarding the storage and transmission of data?
A. t requires additional levels of network authorization
B. t enables confidentiality of data in transit
C. t enables confidentiality of data at rest
D. t requires additional levels of user authentication
عرض الإجابة
اجابة صحيحة: B
السؤال #19
A developer checks out a branch named feat23 from a Git repository. The developer receives this error after attempting to switch to a branch named feat89:Error. You have local changes to 'feat23', not switching branches. Which command switches to branch feat89?
A. it checkout -r feat89
B. it mv feat89
C. it checkout -m feat89
D. it merge feat8
عرض الإجابة
اجابة صحيحة: C
السؤال #20
What is an effective strategy for application logging?
A. se an FTP server for collection
B. se the appropriate logging level
C. se SNMP for messages
D. se a single vendor across the network
عرض الإجابة
اجابة صحيحة: B
السؤال #21
How should end-to-end encryption of API communications be applied between the microservices containers of the application in a Kubernetes environment?
A. et up the network policy on the deployment
B. nsure that container pods are deployed with non-root privileges to enforce encryption
C. odify the application code to instrument encryption of the API communication endpoints
D. eploy Istio service mesh and enable mutual TLS for all the container pods
عرض الإجابة
اجابة صحيحة: D
السؤال #22
What are two principles according to the build, release, run principle of the twelve-factor app methodology?
A. ode changes are able to be made at runtime
B. eparation between the build, release, and run phases
C. eleases should have a unique identifier
D. xisting releases are able to be mutated after creation
E. elease stage is responsible for compilation of assets and binaries
عرض الإجابة
اجابة صحيحة: BC
السؤال #23
An engineer needs to design an application that will manage loT-generated data. To optimize performance, the application design must support a high degree of observability and maintainability. The design must meet these requirements:register every transactional step in the application processhosted on a public cloud PaaS offeringmust not differentiate individual inputsWhich best practice must the engineer implement?
A. xception handling
B. ervice tag tracing
C. pplication event logging
D. nfrastructure resource monitorin
عرض الإجابة
اجابة صحيحة: B
السؤال #24
An engineer needs to improve the responsiveness of an application by implementing client-side HTTP caching. The cached data must be cacheable by everyone and must be validated during each request. Which value must the engineer set in the Cache-Control header to meet these requirements?
A. ax-age
B. o-store
C. rivate
D. o-cach
عرض الإجابة
اجابة صحيحة: D
السؤال #25
How is an OAuth2 three-legged authentication flow initiated?
A. et the authorization code
B. xchange the key for an access token
C. onstruct an API call to retrieve the credentials
D. he user makes a request to the OAuth clien
عرض الإجابة
اجابة صحيحة: D

عرض الإجابات بعد التقديم

يرجى إرسال البريد الإلكتروني الخاص بك والواتس اب للحصول على إجابات الأسئلة.

ملحوظة: يرجى التأكد من صلاحية معرف البريد الإلكتروني وWhatsApp حتى تتمكن من الحصول على نتائج الاختبار الصحيحة.

بريد إلكتروني:
رقم الواتس اب/الهاتف: