When an application is designed that requires high availability, what is a reason to use a cross-region cloud?
When an application is designed that requires high availability, what is a reason to use a cross-region cloud?A . Provide disaster recovery protectionB . Protect from a single component failureC . Minimize costsD . Account for failure in another zoneView AnswerAnswer: A
What should be configured in ansible.cfg as the connection type?
Refer to the exhibit. An engineer is configuring Ansible to run playbooks against Cisco IOS XE Software . What should be configured in ansible.cfg as the connection type?A . network_cliB . sshC . shellD . commandView AnswerAnswer: B Explanation: Reference: https://docs.ansible.com/ansible/latest/user_guide/intro_inventory.html
As part of the Ansible playbook workflow, what is the result when this task is run?
Refer to the exhibit. The YAML represented is using the ios_vrf module. As part of the Ansible playbook workflow, what is the result when this task is run?A . VRFs not defined in the host_vars file are removed from the device.B . VRFs not defined in the host_vars file are...
As part of this workflow, which YANG models augment the interface?
Refer to the exhibit. The Ansible playbook is using the netconf_module to configure an interface using a YANG model. As part of this workflow, which YANG models augment the interface?A . ietf-interfaces and ietf-ipB . iana-if-type and ietf-interfacesC . ietf-ip and openconfig-interfaceD . ietf-ip and iana-if-typeView AnswerAnswer: B
Which two strategies are used to protect personally identifiable information? (Choose two.)
Which two strategies are used to protect personally identifiable information? (Choose two.)A . Encrypt data in transit.B . Encrypt hash values of data.C . Encrypt data at rest.D . Only hash usernames and passwords for efficient lookup.E . Only encrypt usernames and passwords for efficient lookup.View AnswerAnswer: A,C
Which action is the appropriate response?
A client is written that uses a REST API to interact with a server. Using HTTPS as the transport, an HTTP request is sent and received an HTTP response. The response contains the HTTP response status code: 503 Service Unavailable. Which action is the appropriate response?A . Add an Authorization...
Where should application configuration be stored?
Application sometimes store configuration as constants in the code, which is a violation of strict separation of configuration from code. Where should application configuration be stored?A . environment variablesB . YAML filesC . Python librariesD . DockerfilesE . INI filesView AnswerAnswer: A
Which action ensures the resilience of the application in the scope of a single user request?
CORRECT TEXT Refer to the exhibit. The application follows a containerized microservices architecture that has one container per microservice. The microservices communicate with each other by using REST APIs. The double-headed arrows m the diagram display chains of synchronous HTTP calls needed for a single use/request. Which action ensures the...
Which code must be added on the script to accomplish this configuration?
Refer to the exhibit. A developer must configure an SSL certificate for an nginx web server. Which code must be added on the script to accomplish this configuration? A) B) C) D) A . Option AB . Option BC . Option CD . Option DView AnswerAnswer: A
What are two benefits of using distributed log collectors? (Choose two.)
What are two benefits of using distributed log collectors? (Choose two.)A . supports multiple transport protocols such as TCP/UDPB . improves performance and reduces resource consumptionC . provides flexibility due to a wide range of plugins and accepted log formatsD . enables extension of logs with fields and export to...