لا تريد أن تفوت شيئا؟

نصائح اجتياز امتحان الشهادة

آخر أخبار الامتحانات ومعلومات الخصم

برعاية وحديثة من قبل خبرائنا

نعم، أرسل لي النشرة الإخبارية

خذ اختبارات أخرى عبر الإنترنت

السؤال #1
Which two principles are included in the codebase tenet of the 12-factor app methodology? (Choose two.)
A. An application is always tracked in a version control system
B. There are multiple codebases per application
E. It is only possible to have one application deployment per codebase
عرض الإجابة
اجابة صحيحة: D
السؤال #2
There is a requirement to securely store unique usernames and passwords. Given a valid username, it is also required to validate that the password provided is correct. Which action accomplishes this task?
A. Encrypt the username, hash the password, and store these values
B. Hash the username, hash the password, and store these values
عرض الإجابة
اجابة صحيحة: C
السؤال #3
Which two techniques protect against injection attacks? (Choose two.) A.input validation B.trim whitespace C.limit text areas to 255 characters D.string escaping of user free text and data entry
E. only use dropdown, checkbox, and radio button fields
عرض الإجابة
اجابة صحيحة: C
السؤال #4
Into which two areas are AppDynamics APIs categorized? (Choose two.)
A. application-centric
B. analytics-events C
E. agent-side
عرض الإجابة
اجابة صحيحة: A
السؤال #5
What is submitted when an SSL certificate is requested? A.PEM
B. CRT C
عرض الإجابة
اجابة صحيحة: AE
السؤال #6
Which two countermeasures help reduce the risk of playback attacks? (Choose two.)
A. Store data in a NoSQL database
B. Implement message authentication (HMAC)
E. Use short-lived access tokens
عرض الإجابة
اجابة صحيحة: BC
السؤال #7
Which HTTP status code indicates that a client application is experiencing intentional rate limiting by the server?
A. 202
B. 401 C
عرض الإجابة
اجابة صحيحة: C
السؤال #8
This script uses ciscoyang to configure two VRF instances on a Cisco IOS-XR device using the Yang NETCONF type. Which two words are required to complete the script? (Choose two.)
A. ensure B
E. none
عرض الإجابة
اجابة صحيحة: DE
السؤال #9
Which type of file is created from issued intermediate, root, and primary certificates for SSL installation on a server? A.DER B.CSR C.PEM D.CRT
Which type of file is created from issued intermediate, root, and primary certificates for SSL installation on a server? A. ER B
عرض الإجابة
اجابة صحيحة: BE
السؤال #10
A developer has just completed the configuration of an API that connects sensitive internal systems. Based on company policies, the security of the data is a high priority. Which approach must be taken to secure API keys and passwords?
A. Embed them directly in the code
B. Store them in a hidden file
عرض الإجابة
اجابة صحيحة: BD
السؤال #11
The response from a server includes the header ETag: W/"7eb8b94419e371767916ef13e0d6e63d". Which statement is true?
A. The ETag has a Strong validator directive
B. The ETag has a Weak validator directive, which is an optional directive
عرض الإجابة
اجابة صحيحة: AB
السؤال #12
An application has initiated an OAuth authorization code grant flow to get access to an API resource on behalf of an end user. Which two parameters are specified in the HTTP request coming back to the application as the end user grants access? (Choose two.)
A. access token and a refresh token with respective expiration times to access the API resource
B. access token and expiration time to access the API resource C
E. state can be used for correlation and security checks
عرض الإجابة
اجابة صحيحة: D
السؤال #13
While developing an application following the 12-factor app methodology, which approach should be used in the application for logging?
A. Write a log to a file in the application directory
B. Write a log to a file in /var/log
عرض الإجابة
اجابة صحيحة: A
السؤال #14
A kubeconfig file to manage access to clusters is provided. How many clusters are defined and which of them are accessed using username/password authentication versus certificate? A.two clusters; scratch B.three clusters; scratch C.three clusters; development D.two clusters; development
A kubeconfig file to manage access to clusters is provided. How many clusters are defined and which of them are accessed using username/password authentication versus certificate? A
عرض الإجابة
اجابة صحيحة: AE
السؤال #15
Which two statements describe advantages of static code analysis over unit tests? (Choose two.)
A. It checks for potential tainted data where input is not checked
B. It enforces proper coding standards and style
E. It estimates the performance of the code when run
عرض الإجابة
اجابة صحيحة: C
السؤال #16
Which additional line results in the output of Test 1 upon execution of the docker run --rm devnet 1 command in a Dockerfile with this content? A.CMD ["/bin/echo", "Test"] B.RUN ["/bin/echo", "Test"] C.ENTRYPOINT ["/bin/echo", "Test"] D.CMD ["/bin/echo Test"]
Which additional line results in the output of Test 1 upon execution of the docker run --rm devnet 1 command in a Dockerfile with this content? A. MD ["/bin/echo", "Test"] B
عرض الإجابة
اجابة صحيحة: BC
السؤال #17
Refer to the exhibits above and click on the IETF Routing tab in the top left corner to help with this question. A developer is trying to update the routing instance by adding a new route to the routes list using the URL in the exhibit. What action must be taken to fix the error being received?
A. Fix the body being sent to update the routes list
B. Change the HTTP Method being used to make the change C
E. Change the URL to "/ietf-routing:routing-instance/default"
عرض الإجابة
اجابة صحيحة: CD
السؤال #18
Which tow actions must be taken when an observable microservice application is developed? (Choose two.)
A. Know the state of a single instance of a single service
B. Place "try/except" statement in code
E. Deploy microservice to multiple datacenters
عرض الإجابة
اجابة صحيحة: D
السؤال #19
Which two strategies are used to protect personally identifiable information? (Choose two.)
A. Encrypt data in transit
B. Encrypt hash values of data
E. Only encrypt usernames and passwords for efficient lookup
عرض الإجابة
اجابة صحيحة: C
السؤال #20
A company has extended networking from the data center to the cloud through Transit VPC. Which two statements describe the benefits of this approach? (Choose two.)
A. Dynamic routing combined with multi-AZ- deployment creates a robust network infrastructure
B. VPC virtual gateways provide highly available connections to virtual networks
E. Dedicated VPC simplifies routing by not combining this service with other shared services
عرض الإجابة
اجابة صحيحة: A

عرض الإجابات بعد التقديم

يرجى إرسال البريد الإلكتروني الخاص بك والواتس اب للحصول على إجابات الأسئلة.

ملحوظة: يرجى التأكد من صلاحية معرف البريد الإلكتروني وWhatsApp حتى تتمكن من الحصول على نتائج الاختبار الصحيحة.

بريد إلكتروني:
رقم الواتس اب/الهاتف: