Free preview mode
Enjoy the free questions and consider upgrading to gain full access!
200-901
Free trial
Verified
Question 76
DRAG DROP -
Drag and drop the Bash commands from the left onto the related actions on the right.
Select and Place:
Question 77
FILL BLANK -
Fill in the blanks to complete the Bash script in which each file in a directory is renamed to its SHA256 hash?
TARGET_DIR=/usr/local/certs -
for f in '__________ __________'; do
__________ $f' openssl sha -sha256 -r < $f | cut -f1 -cl' ''
Question 78
After a project is migrated to a new codebase, the old_project directory must be deleted. This directory has multiple read-only flies, and it must be deleted recursively without prompting for confirmation. Which Bash command must be used?
- A: rmdir -p old_project
- B: rm -rf old_project
- C: rm -r old_project
- D: rmdir old_project
Question 79
Refer to the exhibit.
The output of a unified diff when comparing two versions of a Python script is shown. Which two single_request_timeout() functions are defined in fish.py and cat.py? (Choose two.)
A.
B.
C.
D.
E.
Question 80
What is a benefit of using edge computing in an IoT implementation?
- A: high speed in data processing
- B: low network design complexity
- C: low cost in network design
- D: high availability for network components
Question 81
What is the benefit of edge computing?
- A: It reduces network latency by moving processing closer to the data source.
- B: It reduces data velocity from devices or other data sources.
- C: It simplifies security as devices and processing are brought closer together.
- D: It removes the need for centralized data processing.
Question 82
DRAG DROP -
Refer to the exhibit.
Drag and drop the variables from the left onto the item numbers on the right that match the missing assignments in the exhibit.
Select and Place:
Question 83
DRAG DROP -
Drag and drop the descriptions from the left onto the correct application deployment models on the right.
Select and Place:
Question 84
Which type of threat occurs when an attacker can send hostile data to an interpreter within an application?
- A: sensitive data exposure
- B: broken authentication
- C: cross-site scripting
- D: injection
Question 85
A company is looking for a cloud deployment which will only use the on-premise infrastructure, is user self-service, and is easy to scale. Which cloud solution should be selected for these requirements?
- A: multi
- B: private
- C: hybrid
- D: public
Question 86
Refer to the exhibit.
Which OWASP threat does this example demonstrate?
- A: broken access control
- B: cross-site scripting
- C: SQL injection
- D: man-in-the-middle
Question 87
What should a CI/CD pipeline aim to achieve?
- A: to require minimal manual interaction
- B: to allow manual testing before deployment
- C: to support new deployments on a fixed monthly schedule
- D: to provide a documented process for feedback
Question 88
A function my_func() returns True when it executes normally. Which Python snippet tests my_func()?
A.
B.
C.
D.
Question 89
What are two roles of an artifact repository in a CI/CD pipeline? (Choose two.)
- A: stores files needed and generated during the build process
- B: provides traceable, searchable, and manageable binary files
- C: is required for CI/CD pipelines executed on a public cloud infrastructure
- D: allows for comparing and merging changes in the source code
- E: is required for managing open source software
Question 90
What is a benefit of organizing code into modules?
- A: reduces the length of code
- B: enables code to be multifunctional
- C: enables the reuse of code
- D: improves overall performance
Question 91
A company is adopting DevOps as part of an internal transformation, and is reviewing the success of the first deployments. Developers and engineers are working together to resolve any resulting issues. However, this new way of working has increased overhead, and the team is finding it difficult to complete releases in time.
Which area of the CALMS framework must the company target for improvement?
- A: Collaboration
- B: Lean
- C: Sharing
- D: Measurement
Question 92
Refer to the exhibit. Which command, including arguments, is executed when the container starts?
- A: /bin/sh -c "/bin/sleep 30 && nginx -g 'daemon off;'"
- B: /bin/sh -c "/bin/sleep 10 && nginx -g 'daemon off;'"
- C: /bin/bash -c "/bin/sleep 30 && nginx -g 'daemon off;'"
- D: /bin/sh -c "/bin/sleep 30" && nginx -g 'daemon off;'
Question 93
A developer created a new secure API and is testing the functionality locally. The API was added to a container for further testing, and other team members and applications need to connect to the API. Which command exposes the API in the container as port 8443 and allows connections external to the host?
- A: docker run -p 127.0.0.1:80:8443/tcp myapiservice
- B: docker run -p 0.0.0.0:443:8443/tcp myapiservice
- C: docker run -p 0.0.0.0:8443:443/tcp myapiservice
- D: docker run -p 127.0.0.1:443:8443/tcp myapiservice
Question 94
A developer has created a new image to use in a Docker build and has added a tag for the image by using the command:
$ docker tag 84fe411926287 local/app:0.4
Which command must be executed next to build the Docker image using the tag?
- A: $ docker build -p local/app:0.4
- B: $ docker run -t local/app:0.4
- C: $ docker run -p local/app:0.4
- D: $ docker build -t local/app:0.4
Question 95
Access to the management interface of devices must be restricted by using SSH and HTTPS. Which two ports must be included in the ACLs for the protocols to work? (Choose two.)
- A: 22
- B: 23
- C: 80
- D: 443
- E: 880
Question 96
What is a benefit of using a code review process in application development?
- A: accelerates the deployment of new features in an existing application
- B: provides version control during code development
- C: enables the quick deployment of new code
- D: eliminates common mistakes during development
Question 97
Which OWASP threat takes advantage of a web application that the user has already authenticated to execute an attack?
- A: phishing
- B: DoS
- C: brute force attack
- D: CSRF
Question 98
Refer to the exhibit. An application must be deployed on a server that has other applications installed. The server resources are to be allocated based on the deployment requirements. The OS for each application must be independent. Which type of deployment is used?
- A: hybrid
- B: virtual machines
- C: containers
- D: bare metal
Question 99
What is a benefit of a distributed version control system?
- A: encourages users to commit small places of work to the system more frequently
- B: ensures that all code meets minimum standards before being committed to the system
- C: allows users to work on the codebase even when not connected to the Internet
- D: ensures that all code is tested before being committed to the system
Question 100
A company requires a new platform to store large volumes of log data that is generated in their assembly plant. The platform must be scalable, so the underlying technology must provide a path for fast deployment of new nodes for data and indexing? The data contains sensitive information, so specialist encryption tools must be used to secure the data. Which application deployment model meets the requirements?
- A: edge
- B: private cloud
- C: public cloud
- D: hybrid cloud
Free preview mode
Enjoy the free questions and consider upgrading to gain full access!