Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

A web application is susceptible to cross-site scripting. Which two methods allow this issue to be mitigated? (Choose two.)

A.

Use only drop downs.

B.

Limit user input to acceptable characters.

C.

Encrypt user input on the client side.

D.

Use AES encryption to secure the script.

E.

Remove all HTML/XML tags from user input.

Refer to the exhibit.

Which line of code needs to be placed on the snippet where the code is missing to provide APl rate-limiting to the requests?

A.

int(self.response.headers.post('Retry-After'))

B.

int(response.headers.get('Retry-After'))

C.

int(self.response.headers.get(Retry-After'))

D.

int(response.headers.post('Retry-After'))

A developer releases a new application for network automation of Cisco devices deployed m a local data center. The application utilizes complex design patterns such as microservices that host multiple third-party libraries and programming languages. The development must be simplified by implementing an observability-driven development lifecycle. Which two considerations must be taken to meet the requirements? (Choose two.)

A.

description of low-level errors

B.

which KPls to monitor

C.

relevant metrics to expose

D.

which monitoring tools to use

E.

identifying customer priorities

Drag and drop the code from the bottom onto the box where the code is missing to create a Webex space Not all options are used.

Refer to the exhibit.

A Docker swarm cluster is configured to load balance services across data centers in three different geographical regions west central and east. The cluster has three manager nodes and three worker nodes Anew service named cisco.devnet is being deployed. The service has these design requirements

• All containers must be hosted only on nodes in the central region

• The service must run only on nodes that are ineligible for the manager role

Which approach fulfills the requirements?

A.

Create a second swarm cluster that is hosted only in the central region.

B.

Create the service manually in the central region and set replicas to 0.

C.

Use placement constraints to control nodes to which the service can be assigned.

D.

Enable the control flag in the containers of the west and east regions to prevent the service from starting

An application is hosted on Google Kubernetes Engine. A new JavaScript module is created to work with the existing application. Which task is mandatory to make the code ready to deploy?

A.

Create a Dockerfile for the code base.

B.

Rewrite the code in Python.

C.

Build a wrapper for the code to “containerize” it.

D.

Rebase the code from the upstream git repo.

Drag and drop the descriptions from the left onto the related OAuth-defined roles on the right.

Refer to the exhibit.

Which configuration of method and parameter retrieves the health of a laptop connected to the network from Cisco DNA Center?

A.

PUT; network-health;

B.

GET; client-health;

C.

GET; network-device;

D.

POST; network-device;

What is a benefit of using model-driven telemetry?

A.

enables operational data to be collected at higher rates and a higher scale

B.

enables the application to pull data faster than pushing the data

C.

reduces the load on the server by enabling the client to pull data

D.

simplifies the development of clients by using a single encoding standard for the data

What is a benefit of continuous testing?

A.

decreases the frequency of code check-ins

B.

removes the requirement for test environments

C.

enables parallel testing

D.

increases the number of bugs found in production