Weekend Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

Refer to the exhibit.

An application is being developed as an information repository. The application will be used to store details about television shows, including the scenario, year, and category. Which database type must used for high performance for the data structure?

A.

time series

B.

Eidocument-based

C.

graph

D.

columnar

Refer to the exhibit.

A developer runs the docker service scale command to increase the number of replicas for the cisco_devnet service. The swarm cluster is using a private IP address subnet. The service has these design requirements:

    It must be hosted behind a virtual IP address that is reachable from the Internet.

    For security reasons, the Docker swarm cluster subnet must not be reachable from the Internet.

Which design approach is used to fulfill the requirements?

A.

Create an overlay network by using a globally roulable subnet and enable a routing mesh within the swarm cluster.

B.

Create a bridge network by using a globally routable subnet and enable a routing mesh within the swarm cluster.

C.

Configure an external load balancer to route requests to the swarm service by using VPN.

D.

Configure an external load balancer to route requests to the swarm service by using NAT.

A developer needs to configure an environment to orchestrate and configure. Which two tools should be used for each task? (Choose two.)

A.

Puppet for orchestration

B.

Terraform for orchestration

C.

Terraform for configuration

D.

Ansible for orchestration

E.

Ansible for configuration

Refer to the exhibit.

An Intersight API is being used to query RackUnit resources that have a tag keyword set to “Site”. What is the expected output of this command?

A.

list of all resources that have a tag with the keyword “Site”

B.

error message because the Value field was not specified

C.

error message because the tag filter should be lowercase

D.

list of all sites that contain RackUnit tagged compute resources

A developer has just completed the configuration of an API that connects sensitive internal systems. Based on company policies, the security of the data is a high priority.

Which approach must be taken to secure API keys and passwords?

A.

Embed them directly in the code.

B.

Store them in a hidden file.

C.

Store them inside the source tree of the application.

D.

Change them periodically.

Refer to the exhibit.

A developer created a Python script to retrieve interface information for the devices in a MeraKi network environment. A security analyst has reviewed the code and observed poor secret storage practices. What is the appropriate password storage approach?

A.

Set the Base64 encoded version of the API key as MER_API_KEY in the code and Base64 decode before using in the header.

B.

Set an OS environment variable for MER_API_KEY to the API key during running the code and longer set MER_API_KEY within the code.

C.

Create a secret for the API key, set MER_API_KEY using the value from the secret in the Pod. and no longer set MER_API_KEY within the code.

D.

Leverage an external secret vault to retrieve MER_API_KEY and embed the vault key as a new variable before running the code.

A developer is designing a modem, distributed microservice enterprise application. The application will be integrating with other systems and focus on a large deployment, so control of API calls is necessary. What is the best practice to reduce application response latency and protect the application from excessive use?

A.

Implement rate limiting on the client side.

B.

Implement rate limiting on the client and server sides.

C.

Do not enforce any rate Imiting

D.

Implement rate limiting on the server side.

Refer to the exhibit.

The application follows a containerized microservices architecture that has one container per microservice. The microservices communicate with each other by using REST APIs The double-headed arrows m the diagram display chains of synchronous HTTP calls needed for a single use/request Which action ensures the resilience of the application in the scope of a single user request?

A.

Redesign the application to be separated into these three layers Presentation. API. and Data

B.

Implement retries with exponential backoff during HTTP API calls

C.

Set up multiple instances of each microservice m active/active mode by using the Orchestrator

D.

Create two virtual machines that each host an instance of the application and set up a cluster

Refer to the exhibit.

An application is created to serve an enterprise Based on use and department requirements, changes are requested quarterly Which application design change improves code maintainability?

A.

Use global variables

B.

Use double quotes instead of single quotes to enclose variables

C.

Use different indent levels for variables

D.

Use more verbose names for variables

Refer to the exhibit.

Which type of python dependency file is shown?

A.

setup.py

B.

TOML

C.

packages

D.

requirements.txt