Month End Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

A customer's cloud services must:

Migrate services to another data center on demand.

Save the operational state of the machine on demand.

Support Windows and Linux GUIs.

Maximize hardware utilization.

Which type of deployment meets these requirements?

A.

bare metal

B.

container

C.

virtual machine

D.

Kubernetes

What is a capability of the AXL API?

A.

It signs a user in to a phone that is configured for extension mobility.

B.

It pulls logs for the Cisco Tomcat service.

C.

It authenticates users who exist in Cisco Unified Communications Manager.

D.

It provides support for HTTP and HTTPS communications.

What does a developer import in a script to parse a file from XML to Python?

A.

function

B.

library

C.

variable

D.

method

A company wants to automate the orders processed on its website using API. The network device that supports the solution must:

    support XML encoding

    support distributed transactions

    support YANG data models

    be support software redundancy

Which requirement prevents the use of RESTCONF for the solution?

A.

software redundancy

B.

YANG data models

C.

distributed transactions

D.

XML encoding

Refer to the exhibit. Drag and drop the code from the bottom onto the box where the code is missing to construct a Python script that calls a REST API request. Not all options are used.

Which network constraint causes the performance of the application to decrease as the number of users accessing the application increases?

A.

latency

B.

loss

C.

bandwidth

D.

jitter

What is the function of an Ethernet switch in a networking environment?

A.

to switch a frame from one port to another port based on IP address

B.

to switch a frame from one port to another port based on MAC address

C.

to provide IP addressing to connected hosts

D.

to block unwanted traffic

Refer to the exhibit. Drag and drop the code snippets from the bottom to the blanks in the code to enable keepalive for the FastEthernet 2/0 interface. Not all options are used.

An engineer must review and clean up a code repository. During the review, the engineer finds a file named config.json that contains API URLs, shared keys, and other application configurations. Which two methods, according to best practice, must be used to protect secrets? (Choose two.)

A.

Store in plaintext if they are not stored in a code repository.

B.

Store as plaintext when the server is secured physically.

C.

Never appear in plaintext at rest or in transit.

D.

Make them long, secure strings that include numbers with special characters.

E.

Always store in a secure vault.

Refer to the exhibit. An engineer is managing the network of an enterprise. The network is using a distributed deployment model. The enterprise uses database to store logs. The current policy requires logs to be stored if changes are made to the infrastructure in any of the devices on the data centers. Which workflow is being automated by the Bash script?

A.

returning backup files that are older than 30 days

B.

deleting backup files that are older than 30 days

C.

configuring the directory to delete files automatically

D.

automating deletion of all backup files every 30 days