Month End Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

What are two security benefits of a Docker-based application?

A.

easier to patch because Docker containers include only dependencies that the application requires

B.

prevents information leakage that can occur when unhandled exceptions are returned in HTTP responses

C.

allows for separation of application that traditionally run in the same host

D.

natively secures access to secrets that are used by the running application

E.

guarantees container images are secured and free of vulnerabilities

What should a CI/CD pipeline aim to achieve?

A.

to allow manual testing before deployment

B.

to require minimal manual interaction

C.

to support new deployments on a fixed monthly schedule

D.

to provide a documented process for feedback

Package updates from a local server fail to download. However, the same updates work when a much slower external repository is used. Way are local updates failing?

A.

The update utility is trying to use a proxy to access the internal resource.

B.

The Internet connection is too slow.

C.

The Internet is down at the moment, which causes the local server to not be able to respond.

D.

The server is running out of disk space.

Which product provides network controller-level management features?

A.

Cisco DNA Center

B.

Cisco NX-OS

C.

Cisco UCS Manager

D.

Cisco ISE

Drag and drop the functionalities from the left onto correct networking devices on the right.

Drag and drop the network automation interfaces from the left onto the transport protocols that they support on the right. (Not all Options are used)

Which two encoding formats do YANG interfaces support?

A.

JSON

B.

XML

C.

XHTML

D.

Plain text

E.

BER

A 401 HTTP response code is returned when calling a REST API. What is the error state identified by this response code?

A.

The server cannot process the request as it has detected an issue in the request syntax or body.

B.

The server accepted the request but the client is not authorized for this content.

C.

The request has not been accepted because it requires authentication.

D.

The server cannot find the requested resource because the path specified is incorrect.

On which port does NETCONF operate by default?

A.

23

B.

443

C.

822

D.

830

Refer to the exhibit.

Which OWASP threat does this example demonstrate?

A.

broken access control

B.

SQL injection

C.

man-in-the-middle

D.

cross-site scripting