Construct an Ansible script to gather information about target routers and then use it to apply no ip redirects to every interface on each device

DRAG DROP Construct an Ansible script to gather information about target routers and then use it to apply no ip redirects to every interface on each device. Drag and drop the code from the bottom onto the correct location in the exhibit to complete the tasks section of the Ansible...

May 18, 2023 No Comments READ MORE +

Which two steps help minimize the risk of attack and compromise of the application?

Refer to the exhibit. An application has been developed as a fileserver. To create this application as a fileserver. the class is used to store data in an SQL database. Which two steps help minimize the risk of attack and compromise of the application? (Choose two.)A . Reject string values...

May 18, 2023 No Comments READ MORE +

Which two elements help to secure your API keys? (Choose two.)

Which two elements help to secure your API keys? (Choose two.)A . ramdomness B. SHA1 C. triple AES D. rotation E. dictionaryView AnswerAnswer: A,C

May 18, 2023 No Comments READ MORE +

Which command validates the success of the application deployment?

An application has been designed based on microservices. The application is deployed on Kubernetes using multiple pods that share the same IP address. Each pod is responsible for a service in the application. Which command validates the success of the application deployment?A . kubectl get pods -o wide -w B....

May 18, 2023 No Comments READ MORE +

CORRECT TEXT

CORRECT TEXT Fill in the blank to complete the statement. A user wants a Kubernetes deployment to run three separate pods of a web application at one time. In the deployment YAML, the user must configure the___________field in the________subsection.View AnswerAnswer: "replicas" , "spec"

May 17, 2023 No Comments READ MORE +