How should a web application be designed to work on a platform where up to 1000 requests per second can be served?
How should a web application be designed to work on a platform where up to 1000 requests per second can be served?A . Use algorithms like random early detection to deny excessive requests.B . Set a per-user limit (for example, 5 requests/minute/user) and deny the requests from the users who...
Which two statements are considered best practices according to the 12-factor app methodology for application design? (Choose two.)
Which two statements are considered best practices according to the 12-factor app methodology for application design? (Choose two.)A . Application code writes its event stream to stdout.B . Application log streams are archived in multiple replicated databases.C . Application log streams are sent to log indexing and analysis systems.D ....
Which statement about microservices architecture is true?
Which statement about microservices architecture is true?A . Applications are written in a single unit.B . It is a complex application composed of multiple independent parts.C . It is often a challenge to scale individual parts.D . A single faulty service can bring the whole application down.View AnswerAnswer: B
Where should application configuration be stored?
Application sometimes store configuration as constants in the code, which is a violation of strict separation of configuration from code. Where should application configuration be stored?A . environment variablesB . YAML filesC . Python librariesD . DockerfilesE . INI filesView AnswerAnswer: B
Which two methods are API security best practices? (Choose two.)
Which two methods are API security best practices? (Choose two.)A . Use tokens after the identity of a client has been established.B . Use the same operating system throughout the infrastructure.C . Use encryption and signatures to secure data.D . Use basic auth credentials over all internal API interactions.E ....
Drag and drop the steps from the left into the correct sequence on the right to describe how to use Git to maintain the current HEAD and revert back to a previous commit, while undoing all intermediate commits
DRAG DROP Drag and drop the steps from the left into the correct sequence on the right to describe how to use Git to maintain the current HEAD and revert back to a previous commit, while undoing all intermediate commits. View AnswerAnswer:
What is the purpose of the file “@token_data” that cURL is handling?
Refer to the exhibit. The cURL POST request creates an OAuth access token for authentication with FDM API requests. What is the purpose of the file “@token_data” that cURL is handling?A . This file is a container to log possible error responses in the request.B . This file is given...
Which scheme is the server employing that causes this error?
A user is receiving a 429 Too Many Requests error. Which scheme is the server employing that causes this error?A . rate limitingB . time outsC . cachingD . redirectionView AnswerAnswer: A
Which two situations are flagged by software tools designed for dependency checking in continuous integration environments, such as OWASP? (Choose two.)
Which two situations are flagged by software tools designed for dependency checking in continuous integration environments, such as OWASP? (Choose two.)A . publicly disclosed vulnerabilities related to the included dependenciesB . mismatches in coding styles and conventions in the included dependenciesC . incompatible licenses in the included dependenciesD . test...
Which two data encoding techniques are supported by gRPC? (Choose two.)
Which two data encoding techniques are supported by gRPC? (Choose two.)A . XMLB . JSONC . ASCIID . ProtoBufE . YAMLView AnswerAnswer: BE