Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

Refer to the exhibit.

The cURL POST request creates an OAuth access token for authentication with FDM API requests. What is the purpose of the file “@token_data” that cURL is handling?

A.

This file is a container to log possible error responses in the request.

B.

This file is given as input to store the access token received from FDM.

C.

This file is used to send authentication related headers.

D.

This file contains raw data that is needed for token authentication.

A client is written that uses a REST API to interact with a server. Using HTTPS as the transport, an HTTP request is sent and received an HTTP response. The response contains the HTTP response status code: 503 Service Unavailable.

Which action is the appropriate response?

A.

Add an Authorization header that supplies appropriate credentials and sends the updated request.

B.

Resend the request using HTTP as the transport instead of HTTPS.

C.

Add an Accept header that indicates the content types that the client understands and send the updated request.

D.

Look for a Retry-After header in the response and resend the request after the amount of time indicated.

What securely stores and encrypts the API keys and tokens that are used for an application deployment?

A.

ITSM

B.

Artifactory

C.

GitHub

D.

Vault

Drag and drop the code snippets from the bottom onto.the boxes where the code is missing to create a Cisco Webex meeting by using the Webex API. Not all options are used.

Refer to the exhibit.

A kubeconfig file to manage access to Kubernetes clusters is shown. How many Kubernetes clusters are defined in the

file, and which cluster FS accessed using username/password authentication rather than using a certificate?

A.

three dusters; scratch

B.

three clusters: development

C.

two dusters; development

D.

two clusters: scratch

An engineer is developing a web-based application that will be used as a central repository for the HR department The application needs to authenticate user access and encrypt communication. Drag and drop the steps from the left into the order on the right to install an application-specific SSL certificate.

Which type of file is created from issued intermediate, root, and primary certificates for SSL installation on a server?

A.

DER

B.

CSR

C.

PEM

D.

CRT

Refer to the exhibit.

Which set of API requests must be executed by a Webex Teams bot after receiving a webhook callback to process messages in a room and reply with a new message back to the same room?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

What is a consideration for using gRPC as the model-driven telemetry protocol on a Cisco IOS XE device?

A.

XML-based transmission format

B.

works in dial-out mode

C.

human-readable transmission format

D.

works in call-out mode

What is a benefit of running multiple instances of a back-end service and using load balancing to distribute the communication between the front-end and back-end services?

A.

The consistency of data for stateful services increases.

B.

High availability is provided for the back-end services.

C.

Scaling horizontally is automated out of the box.

D.

The total load on the database servers decreases.