Loading questions...
Updated
Want a break from the ads?
Become a Supporter and enjoy a completely ad-free experience, plus unlock Learn Mode, Exam Mode, AstroTutor AI, and more.
DRAG DROP -

Refer to the exhibit. Drag and drop the code snippets from the left onto the item numbers on the right that match the missing sections in the cURL exhibit to complete the cURL request to FirePower Device Manager API to create objects. Not all code snippets are used.
Select and Place:

An automated solution is needed to configure VMs in numerous cloud provider environments to connect the environments to an SDWAN. The SDWAN edge VM is provided as an image in each of the relevant clouds and can be given an identity and all required configuration via cloud-init without needing to log into the VM once online.
Which configuration management and/or automation tooling is needed for this solution?
Applications sometimes store configuration as constants in the code, which is a violation of the strict separation of configuration from code.
Where should application configuration be stored?
DRAG DROP -

Refer to the exhibit. Drag and drop the code snippets from the left onto the item numbers on the right that match the missing sections in the curl exhibit to complete the cURL request to FirePower Device Manager API to create objects. Not all code snippets are used.
Select and Place:

A client is written that uses a REST API to interact with a server. Using HTTPS as the transport, an HTTP request is sent and received an HTTP response. The response contains the HTTP response status code: 503 Service Unavailable.
Which action is the appropriate response?
A developer has completed the implementation of a REST API, but when it is executed, it returns a 401 error message.
What must be done on the API to resolve the issue?
Which two data encoding techniques are supported by gRPC? (Choose two.)
Which two statements are considered best practices according to the 12-factor app methodology for application design? (Choose two.)
DRAG DROP -

Refer to the exhibit. Drag and drop the correct parts of the Dockerfile from the left onto the item numbers on the right that match the missing sections in the exhibit to complete the Dockerfile to successfully build and deploy a container running a Python application. Not all parts of the Dockerfile are used.
Select and Place:


Refer to the exhibit. A kubeconfig file to manage access to clusters is provided.
How many clusters are defined and which of them are accessed using username/password authentication versus certificate?
DRAG DROP -

Refer to the exhibit. The self-service Webex bot is failing when many users attempt to interact with it at the same time. Drag and drop the code snippets from the left onto the correct item numbers on the right that match the missing sections in the exhibit to complete this code to handle this high-load situation.
Select and Place:


Refer to the exhibit. Which configuration of method and parameter retrieves the health of a laptop connected to the network from Cisco DNA Center?
Which two statements describe advantages of static code analysis over unit tests? (Choose two.)
DRAG DROP -
An application is being built to collect and display telemetry streaming data. Drag and drop the elements of this stack from the left onto the correct element functions on the right.
Select and Place:


Refer to the exhibit. A developer created the code, but it fails to execute.
Which code snippet helps to identify the issue?
A.

B.

C.

D.

Which two principles are included in the codebase tenet of the 12-factor app methodology? (Choose two.)

Refer to the exhibit. An application uses an API to periodically sync a large data set.
Based on the HTTP message sequence provided, which statements are true about the caching behavior seen in the scenario? (Choose two.)
DRAG DROP -
Drag and drop the git commands from the left into the correct order on the right to create a feature branch from the master and then incorporate that feature branch into the master.
Select and Place:

Which two techniques protect against injection attacks? (Choose two.)
A web application is susceptible to cross-site scripting.
Which two methods allow this issue to be mitigated? (Choose two.)
Which transport protocol is used by gNMI?
A developer has created an application based on customer requirements. The customer needs to run the application with the minimum downtime.
Which design approach regarding high-availability applications, Recovery Time Objective, and Recovery Point Objective must be taken?
How should a web application be designed to work on a platform where up to 1000 requests per second can be served?

Refer to the exhibit. Which two functions are performed by the load balancer when it handles traffic originating from the Internet destined to an application hosted on the file server farm? (Choose two.)
AppGigabitEthernet interface is used as data port for a container on a Cisco Catalyst 9000 Series Switch.
Which two interface configuration options should be used? (Choose two.)