Free preview mode

Enjoy the free questions and consider upgrading to gain full access!

200-901Free trialFree trial

By cisco
Aug, 2025

Verified

25Q per page

Question 76

DRAG DROP -
Drag and drop the Bash commands from the left onto the related actions on the right.
Select and Place:

Image 1

Question 77

FILL BLANK -
Fill in the blanks to complete the Bash script in which each file in a directory is renamed to its SHA256 hash?

TARGET_DIR=/usr/local/certs -
for f in '__________ __________'; do
__________ $f' openssl sha -sha256 -r < $f | cut -f1 -cl' ''

Question 78

After a project is migrated to a new codebase, the old_project directory must be deleted. This directory has multiple read-only flies, and it must be deleted recursively without prompting for confirmation. Which Bash command must be used?

  • A: rmdir -p old_project
  • B: rm -rf old_project
  • C: rm -r old_project
  • D: rmdir old_project

Question 79

Refer to the exhibit.

Image 1

The output of a unified diff when comparing two versions of a Python script is shown. Which two single_request_timeout() functions are defined in fish.py and cat.py? (Choose two.)
A.

Image 2

B.

Image 3

C.

Image 4

D.

Image 5

E.

Image 6

Question 80

What is a benefit of using edge computing in an IoT implementation?

  • A: high speed in data processing
  • B: low network design complexity
  • C: low cost in network design
  • D: high availability for network components

Question 81

What is the benefit of edge computing?

  • A: It reduces network latency by moving processing closer to the data source.
  • B: It reduces data velocity from devices or other data sources.
  • C: It simplifies security as devices and processing are brought closer together.
  • D: It removes the need for centralized data processing.

Question 82

DRAG DROP -
Refer to the exhibit.

Image 1

Drag and drop the variables from the left onto the item numbers on the right that match the missing assignments in the exhibit.
Select and Place:

Image 2

Question 83

DRAG DROP -
Drag and drop the descriptions from the left onto the correct application deployment models on the right.
Select and Place:

Image 1

Question 84

Which type of threat occurs when an attacker can send hostile data to an interpreter within an application?

  • A: sensitive data exposure
  • B: broken authentication
  • C: cross-site scripting
  • D: injection

Question 85

A company is looking for a cloud deployment which will only use the on-premise infrastructure, is user self-service, and is easy to scale. Which cloud solution should be selected for these requirements?

  • A: multi
  • B: private
  • C: hybrid
  • D: public

Question 86

Refer to the exhibit.

Image 1

Which OWASP threat does this example demonstrate?

  • A: broken access control
  • B: cross-site scripting
  • C: SQL injection
  • D: man-in-the-middle

Question 87

What should a CI/CD pipeline aim to achieve?

  • A: to require minimal manual interaction
  • B: to allow manual testing before deployment
  • C: to support new deployments on a fixed monthly schedule
  • D: to provide a documented process for feedback

Question 88

A function my_func() returns True when it executes normally. Which Python snippet tests my_func()?
A.

Image 1

B.

Image 2

C.

Image 3

D.

Image 4

Question 89

What are two roles of an artifact repository in a CI/CD pipeline? (Choose two.)

  • A: stores files needed and generated during the build process
  • B: provides traceable, searchable, and manageable binary files
  • C: is required for CI/CD pipelines executed on a public cloud infrastructure
  • D: allows for comparing and merging changes in the source code
  • E: is required for managing open source software

Question 90

What is a benefit of organizing code into modules?

  • A: reduces the length of code
  • B: enables code to be multifunctional
  • C: enables the reuse of code
  • D: improves overall performance

Question 91

A company is adopting DevOps as part of an internal transformation, and is reviewing the success of the first deployments. Developers and engineers are working together to resolve any resulting issues. However, this new way of working has increased overhead, and the team is finding it difficult to complete releases in time.
Which area of the CALMS framework must the company target for improvement?

  • A: Collaboration
  • B: Lean
  • C: Sharing
  • D: Measurement

Question 92

Image 1

Refer to the exhibit. Which command, including arguments, is executed when the container starts?

  • A: /bin/sh -c "/bin/sleep 30 && nginx -g 'daemon off;'"
  • B: /bin/sh -c "/bin/sleep 10 && nginx -g 'daemon off;'"
  • C: /bin/bash -c "/bin/sleep 30 && nginx -g 'daemon off;'"
  • D: /bin/sh -c "/bin/sleep 30" && nginx -g 'daemon off;'

Question 93

A developer created a new secure API and is testing the functionality locally. The API was added to a container for further testing, and other team members and applications need to connect to the API. Which command exposes the API in the container as port 8443 and allows connections external to the host?

  • A: docker run -p 127.0.0.1:80:8443/tcp myapiservice
  • B: docker run -p 0.0.0.0:443:8443/tcp myapiservice
  • C: docker run -p 0.0.0.0:8443:443/tcp myapiservice
  • D: docker run -p 127.0.0.1:443:8443/tcp myapiservice

Question 94

A developer has created a new image to use in a Docker build and has added a tag for the image by using the command:
$ docker tag 84fe411926287 local/app:0.4
Which command must be executed next to build the Docker image using the tag?

  • A: $ docker build -p local/app:0.4
  • B: $ docker run -t local/app:0.4
  • C: $ docker run -p local/app:0.4
  • D: $ docker build -t local/app:0.4

Question 95

Access to the management interface of devices must be restricted by using SSH and HTTPS. Which two ports must be included in the ACLs for the protocols to work? (Choose two.)

  • A: 22
  • B: 23
  • C: 80
  • D: 443
  • E: 880

Question 96

What is a benefit of using a code review process in application development?

  • A: accelerates the deployment of new features in an existing application
  • B: provides version control during code development
  • C: enables the quick deployment of new code
  • D: eliminates common mistakes during development

Question 97

Which OWASP threat takes advantage of a web application that the user has already authenticated to execute an attack?

  • A: phishing
  • B: DoS
  • C: brute force attack
  • D: CSRF

Question 98

Image 1

Refer to the exhibit. An application must be deployed on a server that has other applications installed. The server resources are to be allocated based on the deployment requirements. The OS for each application must be independent. Which type of deployment is used?

  • A: hybrid
  • B: virtual machines
  • C: containers
  • D: bare metal

Question 99

What is a benefit of a distributed version control system?

  • A: encourages users to commit small places of work to the system more frequently
  • B: ensures that all code meets minimum standards before being committed to the system
  • C: allows users to work on the codebase even when not connected to the Internet
  • D: ensures that all code is tested before being committed to the system

Question 100

A company requires a new platform to store large volumes of log data that is generated in their assembly plant. The platform must be scalable, so the underlying technology must provide a path for fast deployment of new nodes for data and indexing? The data contains sensitive information, so specialist encryption tools must be used to secure the data. Which application deployment model meets the requirements?

  • A: edge
  • B: private cloud
  • C: public cloud
  • D: hybrid cloud
Page 4 of 23 • Questions 76-100 of 557

Free preview mode

Enjoy the free questions and consider upgrading to gain full access!