When an application is designed that requires high availability, what is a reason to use a cross-region cloud?

When an application is designed that requires high availability, what is a reason to use a cross-region cloud?A . Provide disaster recovery protectionB . Protect from a single component failureC . Minimize costsD . Account for failure in another zoneView AnswerAnswer: A

December 7, 2021 No Comments READ MORE +

What should be configured in ansible.cfg as the connection type?

Refer to the exhibit. An engineer is configuring Ansible to run playbooks against Cisco IOS XE Software . What should be configured in ansible.cfg as the connection type?A . network_cliB . sshC . shellD . commandView AnswerAnswer: B Explanation: Reference: https://docs.ansible.com/ansible/latest/user_guide/intro_inventory.html

December 7, 2021 No Comments READ MORE +

As part of the Ansible playbook workflow, what is the result when this task is run?

Refer to the exhibit. The YAML represented is using the ios_vrf module. As part of the Ansible playbook workflow, what is the result when this task is run?A . VRFs not defined in the host_vars file are removed from the device.B . VRFs not defined in the host_vars file are...

December 7, 2021 No Comments READ MORE +

As part of this workflow, which YANG models augment the interface?

Refer to the exhibit. The Ansible playbook is using the netconf_module to configure an interface using a YANG model. As part of this workflow, which YANG models augment the interface?A . ietf-interfaces and ietf-ipB . iana-if-type and ietf-interfacesC . ietf-ip and openconfig-interfaceD . ietf-ip and iana-if-typeView AnswerAnswer: B

December 6, 2021 No Comments READ MORE +

Which two strategies are used to protect personally identifiable information? (Choose two.)

Which two strategies are used to protect personally identifiable information? (Choose two.)A . Encrypt data in transit.B . Encrypt hash values of data.C . Encrypt data at rest.D . Only hash usernames and passwords for efficient lookup.E . Only encrypt usernames and passwords for efficient lookup.View AnswerAnswer: A,C

December 6, 2021 No Comments READ MORE +

Which action is the appropriate response?

A client is written that uses a REST API to interact with a server. Using HTTPS as the transport, an HTTP request is sent and received an HTTP response. The response contains the HTTP response status code: 503 Service Unavailable. Which action is the appropriate response?A . Add an Authorization...

December 5, 2021 No Comments READ MORE +

Where should application configuration be stored?

Application sometimes store configuration as constants in the code, which is a violation of strict separation of configuration from code. Where should application configuration be stored?A . environment variablesB . YAML filesC . Python librariesD . DockerfilesE . INI filesView AnswerAnswer: A

December 5, 2021 No Comments READ MORE +

Which action ensures the resilience of the application in the scope of a single user request?

CORRECT TEXT Refer to the exhibit. The application follows a containerized microservices architecture that has one container per microservice. The microservices communicate with each other by using REST APIs. The double-headed arrows m the diagram display chains of synchronous HTTP calls needed for a single use/request. Which action ensures the...

December 5, 2021 No Comments READ MORE +

Which code must be added on the script to accomplish this configuration?

Refer to the exhibit. A developer must configure an SSL certificate for an nginx web server. Which code must be added on the script to accomplish this configuration? A) B) C) D) A . Option AB . Option BC . Option CD . Option DView AnswerAnswer: A

December 5, 2021 No Comments READ MORE +

What are two benefits of using distributed log collectors? (Choose two.)

What are two benefits of using distributed log collectors? (Choose two.)A . supports multiple transport protocols such as TCP/UDPB . improves performance and reduces resource consumptionC . provides flexibility due to a wide range of plugins and accepted log formatsD . enables extension of logs with fields and export to...

December 4, 2021 No Comments READ MORE +